# https://syzkaller.appspot.com/bug?id=3cba54a61ce93e300ab8b7cdc00cf5b2e4b70f89
# See https://goo.gl/kgGztJ for information about syzkaller reproducers.
#{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"swap":true,"tmpdir":true,"segv":true}
syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x2000480, &(0x7f0000000280), 0x1, 0x775, &(0x7f0000002280)="$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")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0'}, 0xb)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000003, 0x11, r1, 0x0)
ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc004ae0a, &(0x7f0000000080)=""/1)
bpf$BPF_GET_BTF_INFO(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10)