# https://syzkaller.appspot.com/bug?id=53e1c5a723886349fe612d69985fa518e3bf7f92 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0xc41c, &(0x7f0000000040)=ANY=[], 0x1, 0x4d8, &(0x7f0000000f00)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000006ac0)='cpuacct.stat\x00', 0x275a, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee01, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0xee01, 0xee00)