# https://syzkaller.appspot.com/bug?id=77ba8717f52361380361ea99131b99316b1a94c0 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":2,"sandbox":"none","fault_call":-1,"tmpdir":true,"segv":true} mknod(&(0x7f0000000000)='./bus\x00', 0x2000, 0x4400) r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/wsmouse\x00', 0x3, 0x0) r1 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/wsmouse\x00', 0x0, 0x0) r2 = dup(r1) close(r0) recvfrom(r2, &(0x7f0000000180)=""/105, 0x69, 0x1, &(0x7f0000000200)=@in={0x2, 0x2}, 0xc) socket$inet(0x2, 0x7, 0x3) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$VT_GETSTATE(r2, 0x40067664, 0x0) r3 = open(&(0x7f000054a000)='./bus\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./bus\x00', 0x10, 0x20) ioctl$VT_OPENQRY(r3, 0x40047601, 0x0) pledge(&(0x7f0000000240)=')\x00', &(0x7f0000000280)='/dev/wsmouse\x00')