# https://syzkaller.appspot.com/bug?id=da7fcbd38e8a38be1f09949ab54ba23e1249dd8a # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"close_fds":false} syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000), 0x1, 0x792, &(0x7f0000000f80)="$eJzs3c1rHOUfAPDvbJKmSfv7JYKg9RQQNFC6MTW2Ch4qHkSwUNCz7bLZhjabbMluShMCtojgRVDxIOil56r15tWXq/4XHqSlalqseJDIbHbTTbObbtrsbiGfD0z2eeYlz/OdZ16e2RlmA9izxtI/mYhDEfFxEjFSG59ExEA11R9xYn2+u6sr+XRIYm3t7T+S6jx3Vlfy0bBM6kAt83RE/PhBxOHM1nLLS8uzuWKxsFDLT1TmLkyUl5aPnJvLzRRmCvPHJqemjh5/6fixtsJoUsJWf/2yfPDmJ288/82Jf95/6vpHPyVxIg7WpjXGsVvGYqy2TgbSVbjJ67tdWI8lva4ADyXdcfrW9/I4FCPRV021MNTNmgEAnfJeRKwBAHtM4vwPAHtM/XuAO6sr+frQ228kuuvWaxGxfz3++v3N9Sn9tXt2+6v3QYfvJJvujCQRMboL5Y9FxJffvftVOkSH7kMCNHP5SkScGR3bevxPtjyzsFMvbDdxbbD6MXbfaMc/6J7v0/7Py836f5mN/k806f8MNtl3H8aD9//MjV0opqW0//dqw7Ntdxvirxntq+X+V+3zDSRnzxUL6bHt/xExHgODaX6yOmvzp6DGb/97u1X5jf2/Pz89fy0tP/28N0fmRv/g5mWmc5Xco8Zdd+tKxDP9zeJPNto/adH/PdVmGW++8uEXzafU1/H5a2nMzePvrLWrEc81bf97bZls+3ziRHVzmKhvFE18++vnw63Kb2z/dEjLr18LdEPa/sMt4z+wMd/G85rlnZfx89WRH1pNe3D8zbf/fck71fS+2rhLuUplYTJiX/LW1vFH7y1bz9fnT+Mff7b5/r/d9p9eE55pM/7+m79//fDxd1Ya//T22/9osqn9d564fne2r1X57bX/VDU1XhvTzvGv3Qo+yroDAAAAAAAAAAAAAAAAAAAAAAAAgHZlIuJgJJnsRjqTyWbX3/z4ZAxniqVy5fDZ0uL8dFR/K3s0BjL1V12ONLwPdbL2Pvx6/uh9+Rcj4omI+GxwqJrP5kvF6V4HDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1B1r8/n/qt8Fe1w4A6Jj9va4AANB1zv8AsPfs7Pw/1LF6AADd4/ofAPaets//ZzpbDwCge1z/AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0GGnTp5Mh7W/V1fyaX764tLibOnikelCeTY7t5jP5ksLF7IzpdJMsZDNl+Za/qPL6x/FUunCVMwvXpqoFMqVifLS8um50uJ85fS5udxM4XRhoGuRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAED7ykvLs7lisbAgsW1iqJNFDERErwPcYaI/HotqSHQs0XiUGOrdAQoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgMfdfAAAA//+QWyeI") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x275a, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0x0, 0x0}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)="47555ed4bc8957", 0x7)