# https://syzkaller.appspot.com/bug?id=67dbafe7987e8ed784ca4d29a2465ee9ae18d2f1 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"cgroups":true,"close_fds":true,"tmpdir":true} syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x1e, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f757365725f78617474722c61636c2c64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303038302c6c617a7974696d652c6e6f62682c71756f74612c003d930963365d73589c4fe39f57b102948f76"], 0x2, 0x427, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0)