# https://syzkaller.appspot.com/bug?id=a14a795a40369eda12a47f12f921af92f3b97355 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="cefaad1b01100000ff7f", 0xa}, {0x0, 0x0, 0x200}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="00400000ec1f000013200000120000000000000000200000000d0000f8c4a42e840300001e000000000000000010cc030200010052654973457232467300000003000000020001000200000000000000010000001231231212331233123112341341241273797a6b616c6c65720000000000000001001e0061fb1963004eed00", 0x80, 0x10000}, {0x0, 0x0, 0x100c0}, {0x0, 0x0, 0x11000}, {0x0, 0x0, 0x11800}, {0x0, 0x0, 0x2012000}, {&(0x7f0000010d00)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f00"/96, 0x60, 0x2013000}, {&(0x7f0000010d60)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003000000300000000000000080761000535f010061fb196361fb196361fb19630100000000000000", 0x60, 0x2013fa0}], 0x0, &(0x7f0000010dc0))