# https://syzkaller.appspot.com/bug?id=8a22955cd068cf454dd8062d24e826c72b1c4542 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"segv":true,"callcomments":true} openat$evdev(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) kqueue() socket$unix(0x1, 0x5, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000500)=[{0x7, 0xfffffffffffffffe, 0x40c3, 0x40000003, 0x7, 0x4e6, [0x9, 0x4, 0x3, 0x8]}], 0x1, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') r0 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r0, 0xffffffffffffffff, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x82000204) unlink(&(0x7f0000000040)='./file0\x00')