# https://syzkaller.appspot.com/bug?id=37556d70764e226e660023fad17c9c0316cb6f1d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":true} syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x8000, 0x2, &(0x7f0000000140)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400028001000240000004f801", 0x17}, {&(0x7f0000000400)="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", 0x1c2, 0x5fe}], 0x2010000, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x34caa03f8d9ceef2, 0x0) unlink(&(0x7f00000003c0)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0x3af4701e) pwritev(r0, &(0x7f0000000580)=[{&(0x7f00000016c0)='J', 0x1}], 0x1, 0x0, 0x0)