# https://syzkaller.appspot.com/bug?id=d59332e2db681cf18f0318a06e994ebbb529a8db # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"segv":true} syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[@ANYRES64=0x0], 0x1, 0x766, &(0x7f0000000800)="$eJzs3d9rW1UcAPDvTdt166atIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlXZMg+XzgNOfce9Nzvjn3x0nu5d4A+tZ4+icTcTgiPkoiRmvTk4gYquYGI05uLHdnbTWfpiTW19/8I6kuc3ttNR8N70kdrBWejIgf3484ktlab3l5ZS5XLBYWa+XJyvyFyfLyytHz87nZwmxh4fjU9PSxEy+cOL53sf71y8qhGx+/9uw3J/9574lrH/6UxMk4VJvXGMdeGY/x2mcylH6E93h1ryvrsaTXDWBX0k1zYGMrj8MxGgPVXAsHutkyAKBT3o2IdQCgzySO/wDQZ+q/A9xeW83XU29/keium69ExP6N+OvnNzfmDNbO2e2vngcduZ3cc2YkiYixPah/PCK++O7tr9IUHToPCdDM5SsRcXZsfOv+P9lyzcJOPdfGMuP3le3/oHu+T8c/LzYb/2U2xz/RZPwz3GTb3Y0Hb/+Z63tQTUvp+O/lhmvb7jTEXzM2UCs9Uh3zDSXnzhcL6b7t0YiYiKHhtDy1TR0Tt/691Wpe4/jvz0/e+TKtP329u0Tm+uDwve+ZyVVyDxNzo5tXIp4abBZ/stn/SYvx7+k263j9pQ8+bzUvjT+Nt562xt9Z61cjnmna/3evaEu2vT5xsro6TNZXiia+/fWzkVb1N/Z/mtL6698FuiHt/5Ht4x9LGq/XLO+8jp+vjv7Qat6D42++/u9L3qrm99WmXcpVKotTEfuSN7ZOP3b3vfVyffk0/omnm2//263/6XfCs23GP3jj9693H39npfHP7Kj/d565dmduoFX97fX/dDU3UZvSzv6v3QY+zGcHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMShSDLZzXwmk81uPMP78RjJFEvlypFzpaWFmag+K3sshjL1W12ONtwPdap2P/x6+dh95ecj4rGI+HT4QLWczZeKM70OHgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABqDrZ4/n/qt+Fetw4A6Jj9vW4AANB1jv8A0H92dvw/0LF2AADd4/s/APQfx38A6D+O/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTY6VOn0rT+99pqPi3PXFxemitdPDpTKM9l55fy2Xxp8UJ2tlSaLRay+dJ8y390eeOlWCpdmI6FpUuTlUK5MlleXjkzX1paqJw5P5+bLZwpDHUtMgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABoX3l5ZS5XLBYWZWRkZDYzvd4zAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPw//BcAAP//b3EqwQ==") r0 = open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) write$binfmt_script(r0, &(0x7f0000000f80)={'#! ', './bus'}, 0x9) r1 = open(&(0x7f0000000200)='./bus\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) write$binfmt_script(r0, &(0x7f0000000f80)={'#! ', './bus'}, 0x9) (async) openat(r0, &(0x7f0000000040)='/proc/self/exe\x00', 0x5e9441, 0x8b)