# https://syzkaller.appspot.com/bug?id=3047a2fe0d50cdf888a999a1acdc0832701d863e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","fault_call":-1,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"tmpdir":true,"segv":true} r0 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x62fc2) ioctl$HIDIOCGRAWNAME(r0, 0x40086602, &(0x7f0000000080)) r1 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x181d02) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @rumble={0x0, 0xbfe}}) r2 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x101142) write$hidraw(r2, &(0x7f0000001180)='=', 0x3b000) r3 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x14f142) r4 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100, "ed105400000000003ec13e2000"}) write$hidraw(r3, &(0x7f0000000000)="c2", 0xa00000) write$hidraw(r0, &(0x7f00000000c0)="9b", 0x1) ioctl$HIDIOCGRAWNAME(r1, 0x40305829, &(0x7f0000000080)) r5 = syz_open_dev$evdev(&(0x7f0000000100), 0x3f, 0x100) ioctl$EVIOCGEFFECTS(r5, 0x80044584, &(0x7f0000000140)=""/132)