# https://syzkaller.appspot.com/bug?id=d5793839fb43edad7abb5ca9b6ee902453026ae7 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"close_fds":false,"segv":true} r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000000008, 0x926, 0x3333, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x22}}}}]}}]}}, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xea, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f00000002c0)=ANY=[@ANYBLOB="000022000000220089c62c16052dc0b32a4e689c814e156487094c56623dec137976c291f91a44febc"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x107d) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000280)={0x11, 0xeb, &(0x7f0000000180)="299dd6e7471f72e14d33d3aaae215c8b698229271063388938d0aa21cbac8e7bffac120a276083c08b787c93caca828feb5f71c0d2216966695cfb17529c8cc2c61e72d4f278839d1abb3eb45f8f82e7ac67e5fd5b832cb996fbee2605bd73b53f1766e0cc12fc31633432e468163a5c7b7e3886b44eda6f6889c0dbd5a7c890a9a43cc47726b3c3c91c136804d4c4b1dcb62f8be7d3632a80ec71ccc5c33187faf4831d9c5cc30473cc0758d8177365343da0fea52a857984210372fdbaf3964238879780e4dc88952eab4e14c2391b1249ded0506d9191870df6871a51bc6557a3df5cdcbaf4c50cf4d8"}) write$hidraw(r1, &(0x7f00000000c0)="047bc0e9eb4465d225fb59c36f17e9445f68550760033d3276a8b0239199b76c4194881d81d94ba7d9c7637f87613ae5156ac2302f1dfd94b834c5baead970fe4e563b3c144f22c41579858b877f", 0x364)