# https://syzkaller.appspot.com/bug?id=ca42a481e0bd58567705048a2b30a3b99c5c801a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"tmpdir":true} r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x0, 0x0, &(0x7f0000000480)=""/92, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003380)) r1 = eventfd2(0x76, 0x1) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000001c0)={0x0, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000600)=""/175, 0x0, 0x1000}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x0, r1}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000140)=0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3000490, &(0x7f00000003c0)={[{@dioread_lock}, {@auto_da_alloc}, {@nojournal_checksum}, {@norecovery}, {@auto_da_alloc}, {@noquota}, {@data_err_abort}, {@grpid}, {@grpjquota}, {@nouid32}, {@grpid}]}, 0x45, 0x7d3, &(0x7f0000000c80)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file1'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0)