# https://syzkaller.appspot.com/bug?id=c7ccea941f59a5a69d6ddef48a15e4dc5e4108cb # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"close_fds":false,"devlinkpci":true} perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000300)='unconfined_u:\xf3ystem_r:insmod_\x89$s0-s0:c0.c1023\x00bj*\x98\x1c\xc0L\t\x1e\xd6\x82\xc7\xa6\x81mW\x8dN\x97}\x88\x9d\xf307!\x04|=9\x82\xb5\xc8*\xe8\xffv5\xca\r\xff\x8e\xb5\x82\xf60\x901\r\xd8V\xe9\xbc\xd6S)\xf8@R\xda>\x1d\xaf\x05\xbd\xfc! \x9a\xf3\x99\x06\xa98\xe2\xc6U\xeb\xe0e\xd0\xd6\xec\x03a\x8a\xf2C\xf4\x13\xd7Q\xb5\xb0O\x81\x94\x1f\x92\xaf\xab7\x89X\x190x{\x0f\xe3\xeb\x15\xec\xdc\x8b\xa2\x9b\xf4\x90\xf7\xf9\bmHh\x90(\x1c\xe1\":\x92\xaa\x99', 0x3c6, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000040)={0x0, 0x10001}) read$FUSE(r0, &(0x7f0000000380), 0x313) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000280), 0x0) syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000100)=""/171, 0xab}, {&(0x7f00000013c0)=""/112, 0x70}, {&(0x7f0000001500)=""/242, 0xf2}, {&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000001600)=""/253, 0xfd}, {0x0}, {&(0x7f0000001700)=""/183, 0xb7}], 0x7)