# https://syzkaller.appspot.com/bug?id=da7fcbd38e8a38be1f09949ab54ba23e1249dd8a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":5,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true} r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x0, 0x0, &(0x7f0000000480)=""/92, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000003380)) r1 = eventfd2(0x76, 0x1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000600)=""/175, 0x0, 0x1000}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x0, r1}) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)={[{@nobh}, {@debug}]}, 0x1, 0x796, &(0x7f0000002480)="$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") ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000140)=0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)={'#! ', './file1'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r2, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x40000)