# https://syzkaller.appspot.com/bug?id=b4348d8008fcf9fe9e528f0f0cd24f81ad1d4a5b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":2,"sandbox":"","fault_call":-1} mknod(&(0x7f0000000200)='./file0\x00', 0x2008, 0x4501) r0 = open(&(0x7f0000000280)='./file0\x00', 0x11e, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x80402005, 0x4300) ioctl$WSMUXIO_INJECTEVENT(r0, 0x80185760, &(0x7f0000000080)={0x8, 0x34, {0x1, 0x3}}) r1 = open$dir(&(0x7f00000007c0)='./bus\x00', 0x205, 0x0) close(r1)