# https://syzkaller.appspot.com/bug?id=c82fb107b1cff1be32fa92a3d8b37bd5cc98b09d # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":5,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false} r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000080), 0x1, 0x478, &(0x7f0000000dc0)="$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") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, r0) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_open_procfs$pagemap(r3, &(0x7f0000000580)) ioctl$PAGEMAP_SCAN(r4, 0xc0606610, &(0x7f0000000200)={0x60, 0x0, &(0x7f0000245000/0x2000)=nil, &(0x7f00004c7000/0x1000)=nil, 0x0, 0x0, 0x0, 0x1bb, 0x0, 0x0, 0x6a, 0x55})