# https://syzkaller.appspot.com/bug?id=ae28a692910f2e066889b98c890adc67d88a4fda # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":4,"slowdown":1,"sandbox":"none","close_fds":false,"tmpdir":true,"segv":true} fork() getppid() (async, rerun: 32) recvmsg(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x500, 0x0}, 0x0) (async) sigtimedwait(&(0x7f00000003c0)={[0x7f, 0x6, 0x4, 0x9e4]}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sival_int, @poll}, &(0x7f0000000480)={0xfb7, 0x57}) (async) r0 = geteuid() r1 = semget$private(0x0, 0x2, 0x60) __semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000005a00)=0x0) r2 = getuid() r3 = getppid() (async) r4 = fork() (rerun: 32) faccessat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x2, 0x800) (async) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000300)={{r0, 0x0, r2, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x7}, 0x8005, 0x8, 0x4, 0x1, r3, r4, 0x8}) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x9, 0x400, 0x1, &(0x7f0000000040)='./file0\x00', 0x5, 0xffff, 0x379e, 0x7, 0x4, 0x2000000, &(0x7f0000000080)='*^&\xeb+^\x00', [0x7, 0x7ff, 0x0, 0x1, 0xfffffd47, 0x3, 0x5, 0x100, 0x3, 0x1, 0x59, 0x6b38, 0x101, 0x401, 0x10001, 0x7fffffff, 0x9, 0x1, 0x2427, 0x7, 0x619, 0x0, 0xfffffffd, 0x2, 0xda9, 0x4, 0x2, 0xb736, 0xffffff80, 0xb8, 0xfff, 0x5, 0x9, 0x0, 0x400, 0x10001, 0x8, 0x7, 0x3, 0xffffff01, 0xb5, 0x5, 0x2, 0x2, 0xffffffff, 0x5, 0x0, 0x2, 0x0, 0xffffffff, 0xf6f, 0x2, 0x8, 0x5633, 0x4041, 0x400, 0x12, 0x4273, 0x3, 0xffffffff, 0xa6, 0x6, 0x1ff, 0x3, 0x40, 0x1, 0x6, 0x19, 0x2, 0x1, 0x0, 0x4, 0x7, 0x200, 0x3ff, 0x1, 0x2, 0xfffffffa, 0x1f, 0x1, 0x4, 0x9, 0x7, 0x6, 0x8, 0xb7c, 0x8, 0x5, 0x7, 0x0, 0x3ff, 0x1000, 0xa426, 0x400, 0xd0, 0x79ca]})