# https://syzkaller.appspot.com/bug?id=2a85e01e6f3d6e7e59a2020ac1767ca238096fda # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":6,"sandbox":"","fault_call":-1,"close_fds":false,"segv":true} syz_open_dev$hidraw(0x0, 0x0, 0x12d43d) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_connect(0x1, 0x2d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_open_dev$hidraw(0x0, 0x8, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000000c0)=""/123) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0)