# https://syzkaller.appspot.com/bug?id=c24d6f24e9e4b460fa4a66ceb1d972fe836e9873 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000005000), 0xe83) write$FUSE_GETXATTR(r0, &(0x7f0000000180)={0x18, 0x0, 0x1, {0x7}}, 0x18) chmod(&(0x7f0000000140)='./file0\x00', 0x150) read$FUSE(r0, &(0x7f0000001000), 0x1000) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) execveat(0xffffffffffffffff, &(0x7f00000001c0)='.\x00', &(0x7f0000000680)=[&(0x7f00000003c0)='em0vboxnet0$system}em0+mime_typeselfwlan1vmnet0keyringself\x00', &(0x7f0000000480)='[vmnet0nodev$\x00', &(0x7f00000004c0)='{\'system)\x00', &(0x7f0000000500)='%security\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='\\!bdev%\x00', &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', &(0x7f0000000600)=']\x00', &(0x7f0000000640)='/dev/qat_adf_ctl\x00'], &(0x7f0000000800)=[&(0x7f0000000700)=']lovboxnet1*usermd5sumeth0\x00', &(0x7f0000000740)='selinux\x00', &(0x7f0000000780)='/dev/qat_adf_ctl\x00', &(0x7f00000007c0)='rootmode'], 0x100) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20)