# https://syzkaller.appspot.com/bug?id=1a44764bc4a73d62dd76e3707e4b1166f2e9da4b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000002c0)={[{@barrier}, {@jqfmt_vfsold}, {@noquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x10}}, {@journal_dev={'journal_dev', 0x3d, 0xd}}]}, 0x1, 0x4c2, &(0x7f0000000a00)="$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") open(&(0x7f0000007fc0)='./bus\x00', 0x72342, 0xf0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r1, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x7a00, 0x0, 0x3)