# https://syzkaller.appspot.com/bug?id=48936ec7813d93df7f55fc23ad1273dd9212abc8 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true,"callcomments":true} bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012001b2300000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)="52e829a7358c1ae2dbb57a06ac249653be5aa14795d6e3be8552f1e65dfb9d235764cacddc7d1c239c1f7bd22480a1a9784aa0ed25d978050d180d1ecca7158e6f525745217ec1e634c450d5fed10221b047bdd9923cbdde0785534d54cb62f5c46b91004c60ec71a90f5eb1e9720b698b7afa5bf956aa85407cc9a226f010ba", 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$selinux_access(0xffffffffffffffff, 0x0, 0x41) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040), &(0x7f0000002080)='./file0\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x3e, 0x0, 0x0) syz_fuse_handle_req(r0, 0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000080c0)={0x50, 0x0, 0x2000000000020000, {0x7, 0x2b, 0x2000000}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INTERRUPT(r0, &(0x7f00000004c0)={0x10}, 0x10)