# https://syzkaller.appspot.com/bug?id=0a0736596e637d7001468494a9d9425481138e3f # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":8,"sandbox":"none","fault_call":-1,"tun":true,"tmpdir":true,"cgroups":true,"netdev":true,"resetnet":true,"segv":true} mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r0 = epoll_create1(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x2, 0x5, 0x1, 0x22, r1, 0x6}, 0x2c) r2 = epoll_create1(0x0) close(r0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x20000000) umount2(&(0x7f0000000200)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000000040)={0x1}) ppoll(&(0x7f0000000540)=[{r2}, {r3, 0x1011}], 0x2, &(0x7f0000000580)={0x77359400}, &(0x7f00000005c0), 0x8)