# https://syzkaller.appspot.com/bug?id=abb6cc54bd2802dfdeb0978f7adf870325b80f92 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:true Repeat:true Procs:8 Sandbox:namespace Fault:false FaultCall:-1 FaultNth:0 EnableTun:true UseTmpDir:true HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x800e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a45321, &(0x7f0000777000)={{0xffffffffffffffff, 0x0}, "706f7274310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x4, 0x0, 0x9c0, 0x3, 0xfffffffffffffff8, 0x9, 0x200, 0x0, 0x0, 0x9bd, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8000000200000004, 0xff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000c4000)="2e2f66696c653000", 0x0) mount(&(0x7f0000144000)="2e2f66696c653000", &(0x7f0000344000-0x8)="2e2f66696c653000", &(0x7f0000fb6000-0x4)="6e667300", 0x0, &(0x7f000000a000)="") r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00003bc000+0x2a5)="2f6465762f6375736500", 0x80000, 0x0) connect(r0, &(0x7f00001dc000-0x10)=@ax25={0x3, {"82554f658701e7"}, 0xccbe}, 0x10) r1 = syz_open_dev$urandom(&(0x7f0000cc7000-0xd)="2f6465762f7572616e646f6d00", 0x0, 0x40000) fcntl$setstatus(r1, 0x4, 0x40400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a93000-0x10)="2f6465762f73657175656e6365723200", 0x4002, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000e55000+0xd18)=0x0)