# https://syzkaller.appspot.com/bug?id=28c4a71ecc4b55c2bbc7d921f0972df1a1a701b9 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"tmpdir":true,"callcomments":true} syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1008412, &(0x7f00000007c0)={[{@delalloc}, {@data_err_abort}, {@delalloc}, {@nogrpid}, {@auto_da_alloc}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b2}}, {@data_err_ignore}, {@nouid32}, {@quota}, {@user_xattr}, {@noacl}, {@dioread_nolock}]}, 0x1, 0x561, &(0x7f0000000240)="$eJzs3c9rHOUbAPBnNtn+/n6bQikqIoEerNRumsQfFTzUo2i1oPcakmko2XRLdlOaWLA92IsXKYKIvXjXuycp/gP+FQUtFClBD14is5lNts1udpNuu6n7+cC077szO+88O/O8eWffXTaAgTWa/VOIeDEivk4iDkdEkq8bjnzl6Np2Kw+vT2dLEqurn/yZ1LfL6o19NZ53MK+8EBG/fhlxsrC53erS8txUuZwu5PWx2vyVserS8qlL81Oz6Wx6eWJy8sybkxPvvP1Wz2J97fzf33189/0zXx1f+fan+0duJ3E2DuXrmuN4AjeaK6Mxmr8mxTj72Ibja//1os1dIen3AbAjQ3meFyPrAw7HUJ71wH/fFxGxCgyoRP7DgGqMAxr39j26D35uPHhv7QZoc/zDa++NxL76vdGBleSRO6PsfnekB+1nbfz8x53b2RK9ex8CoKMbNyPi9PDw5v4vyfu/nTvdxTaPt6H/g2fnbjb+eb3V+KewPv6JFuOfgy1ydyc653/hfg+aaSsb/73bcvy7Pmk1MpTX/lcf8xWTi5fKada3/T8iTkRxb1Yf36KNMyv3Vtutax7/ZUvWfmMsmB/H/eG9jz5nZqo29SQxN3twM+KlluPfZP38Jy3Of/Z6nO+yjWPpnVfaresc/9O1+kPEqy3P/8aMVrL1/ORY/XoYa1wVm/1169hv7drvd/zZ+T+wdfwjSfN8bXUbO29Meu77J223ySPxR/fX/57k03p5T/7YtalabWE8Yk/y4ebHJzae26g3ts/iP3F86/5v4/r/ZX0/+yPisy5fhltHf3x5Xzfx9+n8z2zr/G+/cO+Dz79v1353/d8b9dKJ/JFu+r8Ox1WM7V/NAAAAAAAAsOsVIuJQJIXSerlQKJXWPt9xNA4UypVq7eTFyuLlmah/V3YkioXGTPfhps9DjOefh23UJx6rT0bEkYj4Zmh/vV6arpRn+h08AAAAAAAAAAAAAAAAAAAA7BIH23z/P/P7UL+PDnjq/OQ3DK6O+d+LX3oCdiV//2FwyX8YXPIfBpf8h8El/2FwyX8YXPIfBpf8BwAAAAAAAAAAAAAAAAAAAAAAAAAAgJ46f+5ctqyuPLw+ndVnri4tzlWunppJq3Ol+cXp0nRl4UpptlKZLael6cp8p/2VK5Ur4xOxeG2sllZrY9Wl5QvzlcXLtQuXPjo0m15Ii88kKgAAAAAAAAAAAAAAAAAAAHi+VJeW56bK5XRBQWFHheHdcRgKPS70u2cCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgA3/BgAA//+kdDcZ") r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0xffffffffffffff23, 0x17, 0x2, {0x7, './file0'}}, 0xfffffdab)