# https://syzkaller.appspot.com/bug?id=1c152b8d410226314785dec4cf180af0e4c54160 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x40086607, &(0x7f0000000180)={@id={0x2, 0x0, @auto="ffee8e7268b4fecd2fce2d54fbd909e4"}}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f0000000280)={0x0, 0x40000000000}, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r4, 0x6628) write$binfmt_elf64(r3, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x5, 0x3, 0x157928a, 0x3, 0x3e, 0x6, 0xea, 0x40, 0x82, 0x8000, 0x4, 0x38, 0x1, 0x6, 0x2, 0x7}, [{0x3, 0x3, 0x7ff, 0x101, 0x81, 0x5, 0x8, 0xfffffffffffffffd}], "9e0ddf0cf2293b59ddbf7dd0063e8ef3ee647539c4204b2b715dfab63805ff40bb11bfb1611fbc3c150e82e822d6683feeadd45287", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7ad) io_setup(0x4000009, &(0x7f0000000000))