# https://syzkaller.appspot.com/bug?id=a3d085c934448d325eba613246a150873080b331 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"tmpdir":true} syz_mount_image$nilfs2(&(0x7f0000000040), &(0x7f0000000080)='./file2\x00', 0x0, &(0x7f0000000140)=ANY=[], 0x1, 0xa1e, &(0x7f0000000ac0)="$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") r0 = open(&(0x7f00000000c0)='./file2\x00', 0x147042, 0x0) ftruncate(r0, 0x0) write$cgroup_pid(r0, &(0x7f0000000180), 0x12) fchdir(0xffffffffffffffff) creat(0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x40286608, 0x0) openat(0xffffffffffffffff, 0x0, 0x420881, 0x42) openat$smackfs_cipsonum(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xc4009420, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {0x0}}, 0x18)