# https://syzkaller.appspot.com/bug?id=afae2916de5500924b088ef3a0d3c31f3b8754e4 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$ext4(&(0x7f0000001080)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES16=0x0], 0x1, 0x42e, &(0x7f00000004c0)="$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") creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0xc0185879, &(0x7f0000000680)={0x0, 0x200002000003})