# https://syzkaller.appspot.com/bug?id=487023d89abc146dc9dcf191b2d632847e88fa94 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$ext4(&(0x7f00000008c0)='ext4\x00', &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800080, &(0x7f0000000280)={[{@test_dummy_encryption}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@stripe}]}, 0x3, 0x45c, &(0x7f0000000f00)="$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") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0)