# https://syzkaller.appspot.com/bug?id=da12630a4d7b654b78cb955ea55ba6ed44358adb # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"collide":true,"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","fault_call":-1,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"sysctl":true,"tmpdir":true,"segv":true} syz_open_dev$evdev(0x0, 0x1000000003, 0x193540) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401, "ed105400000000003ec13e2000"}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000000)={0x5732b093b33e81a9, 0x8c4, 0x7fff, {0xfffd}, {0xc7}, @const={0x8001, {0x40, 0x1, 0x3, 0x1}}}) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0)