# https://syzkaller.appspot.com/bug?id=7e90ffa51645d388bc8b816640b97f47e020de76 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2010400, &(0x7f0000000400), 0x1, 0x4b9, &(0x7f0000000480)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001300)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704002a52a641a2527d45cc073fc549349c980000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='tmpfs\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000001180)={0x1f, 0x0, @any, 0x3}, 0xe) listen(r0, 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000540)='./file1\x00', 0x0, 0x1002082, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)