# https://syzkaller.appspot.com/bug?id=ebe2bbed618638b7d309da88058dce0b7bf80214 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"cgroups":true,"close_fds":true,"usb":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x804800, &(0x7f0000000480)=ANY=[@ANYBLOB="0089f2832730bf994f589885cc769fe9ff3a1ac5d0149ba21207000000000000979898c94e056c0850980a0083cfe8b4efdc8ec300000000f2935e176297b1084a51bd8f968f05a5d657832ff1431d562136b4da36ab17f77500000000000000c6ca549f1f000000bea8d9a9774673bfbd572bbbb85171000000000000000000", @ANYRESDEC], 0x1, 0x750, &(0x7f0000001640)="$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") chdir(&(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x28011, r0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000540)="f0f497d158c250754eaf19dac588dbf72d43ced31ff155072afac11e67a50e865e1e4c0ad6a89a73984c8076801244e2dc9d707a9eec7eb732c91cf72d828a9b217e07449a9bab0ddc422972d9e7b8f9fa16c03f6d117397029c5636e08bb29b6c5bc84680cfbca65036e0a02627b1f9480f01ce040a42a2761ea1e042312c37965907501e4948275d882c3adf809d9930f7434e8e23", 0x96}], 0x2) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000000)='./bus\x00', 0x0, 0x813010, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[], 0x208e24b)