# https://syzkaller.appspot.com/bug?id=7a33f4ddf8c51a1b9512fff5e1c708fa395676cf # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f00000003c0)={[{@noload}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@auto_da_alloc}, {@dioread_nolock}, {@nobarrier}]}, 0x3, 0x45d, &(0x7f0000001380)="$eJzs3M9vFOUbAPBnpi1Q4PtlJYjyQ62isfFHSwsiBw9qNPGgiYke8FjbQpCFGloTIUTRGDwaEm+aGI8m/gWe9GLUk4lX9WxIiHIBPa2Z7ky7u91tu6XtqPv5JAPvO/Nu3ufZmXf3nXlZAuhZQ9kfScTOiPg5InbVq80Nhup/3bpxafLPG5cmk6jVXvk9mW9388alyaJp8bodRaU/Iv0giQNt+p29cPHMRLU6fT6vj86dfXN09sLFxwc/jZg+NX1u/Pjxo0fGnjw2/kTH2Ld1kWeW183978wc3PfCa1dfmjxx9fXvv0yK/FvyWCdDyx18qFZb5+7K9b+GctJfYiB0pa8+TGNgfvzvir5YPHm74vn3Sw0O2FC1Wq22t6j8uuTw5RrwH5ZE2REA5Si+6LP732LbxOlH6a4/U78ByvK+lW/1I/2R5m0GWu5v19NQRJy4/Ndn2RYb8xwCAKDJ19n857F287809ja0+3++hlKJiDsiYndEHIuIPRFxZ8R827si4u4u+29dJFk6/0mvrSmxVcrmf0/la1vN879i9heVvryWzQErgwPJydPV6cP5ezIcA1uz+tgyfXzz3E8fdTrWOP/Ltqz/Yi6Yx3Gtf2vza6Ym5iZuJ+dG19+L2N/fLv9kYSUgiYh9EbF/jX2cfuSLg52OrZz/MtZhnan2ecTD9fN/OVryLySN65Onz06cal6fHN0W1enDo8VVsdQPP155uVP/q8r/k9vPs5Ps/G9ve/0v5F9JGtdrZ7vv48ovH3a8p1nr9b8lebVp39sTc3PnxyK2JC/Wg27cP97SbnyxfZb/8KH24393LL4TByIiu4jviYh7I+K+PPb7I+KBiDi0TP7fPfvgG007hnd2kf/GyvKf6ur8Lxa2ROue9oW+M99+1dRpJbrIPzv/R+dLw/me1Xz+rSautV3NAAAA8O+TRsTOSNKRhXKajozU/w3/ntieVmdm5x49OfPWuan6bwQqMZAWT7rqz4Prz0PH8tv6oj7eUj+SPzf+uG9wvj4yOVOdKjt56HE7Ooz/zG99ZUcHbDi/14LeZfxD7zL+oWclf5QdAVCaNt//g2XEAWy+dvP/d0uIA9h8LeN/Ydnv6RJiATaX53/Qu4x/6F3GP/Sk2cFY+UfyCgpLCpGu2GbbKv+DiF4rpPGPCGP5QtmfTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOvj7wAAAP//4E/nIA==") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @any, 0xfffa}, 0xe) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5412, 0x10000000000004) getpid() connect$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, 0x6e) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) listen(r1, 0x0)