# https://syzkaller.appspot.com/bug?id=ae28a692910f2e066889b98c890adc67d88a4fda # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"slowdown":1,"sandbox":"","sandbox_arg":0,"close_fds":false,"segv":true} r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f0000000100)={0x0, 0x2, 0x0, &(0x7f0000000080)='./file0\x00', 0x7d451615, 0x200, 0x2, 0x2, 0x3, 0x0, &(0x7f00000000c0)='/dev/bpf\x00', [0x3, 0x1, 0x4, 0x8000, 0x851, 0x0, 0x7, 0x5, 0x6, 0x1, 0x2, 0x7ff, 0xfffffffa, 0xfffffe00, 0xdf5, 0x2, 0x9, 0x4, 0x5, 0x6, 0x3, 0x815, 0x6, 0x6, 0x8, 0x5, 0x3, 0x3, 0x9, 0xff, 0x6, 0x2, 0x0, 0x74c763ea, 0x1, 0x8, 0xaae4, 0x7, 0x34a5d0be, 0x80000000, 0x4, 0x4, 0x0, 0x8, 0x0, 0x9, 0x3, 0xfffffe01, 0x7, 0x80, 0x7, 0xfffffe00, 0x200, 0x5, 0x4, 0x1, 0x29, 0x32, 0x2, 0x3f, 0x8, 0x6, 0x1, 0x7fff, 0x2, 0x7, 0x1, 0x0, 0x2, 0x1, 0x47, 0x6, 0xa71, 0x7, 0x100, 0x5, 0xe5, 0x4, 0x0, 0x1, 0xfffff800, 0x10661f27, 0x5af, 0x80000001, 0xae, 0x30, 0x5, 0x4, 0x3, 0x101, 0xffffffec, 0xff, 0x7, 0x2a9, 0x1, 0x4]})