# https://syzkaller.appspot.com/bug?id=65f3caae39807b0b41f8e62dec2a517a7e510651 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"tmpdir":true} syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000050, &(0x7f0000000140)=ANY=[], 0xd0, 0x68c, &(0x7f0000000600)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x3af4701e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='net_prio.prioidx\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[], 0x208e24b)