# https://syzkaller.appspot.com/bug?id=6a6f9737a8ba6aa7765e3342a50fe924808987fd # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x40086607, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f0000000280)={0x0, 0x40000000000}, 0x0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r4, 0x6628) write$binfmt_elf64(r3, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x5, 0x3, 0x157928a, 0x3, 0x3e, 0x6, 0xea, 0x40, 0x82, 0x8000, 0x4, 0x38, 0x1, 0x6, 0x2, 0x7}, [{0x3, 0x3, 0x7ff, 0x101, 0x81, 0x5, 0x8, 0xfffffffffffffffd}], "9e0ddf0cf2293b59ddbf7dd0063e8ef3ee647539c4204b2b715dfab63805ff40bb11bfb1611fbc3c150e82e822d6683feeadd45287"}, 0xad) io_setup(0x4000009, &(0x7f0000000000))