# https://syzkaller.appspot.com/bug?id=1c152b8d410226314785dec4cf180af0e4c54160 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') write$tcp_mem(r3, &(0x7f0000000200)={0x7f, 0x20, 0xffffffff, 0x20, 0x9}, 0x48) membarrier(0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x40086607, 0x0)