# https://syzkaller.appspot.com/bug?id=000904822d835ec655974595d29ad641a577d33e # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"repeat":true,"procs":1,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"close_fds":true,"usb":true} write(0xffffffffffffffff, &(0x7f0000000000)="2400000011005f0414f9f4070009040081000000490000000000000008000f0001000000", 0x24) setsockopt$MRT_TABLE(0xffffffffffffffff, 0x0, 0xcf, &(0x7f0000000100)=0xfc, 0x4) syz_mount_image$iso9660(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f0000000580), 0x1, 0x4f8, &(0x7f00000005c0)="$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") mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1204001, &(0x7f00000011c0)={[{@lowerdir={'lowerdir', 0x3d, '.'}, 0x3a}], [], 0x2f}) chdir(&(0x7f00000001c0)='./file0\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) lseek(r0, 0x7ff, 0x0) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) acct(&(0x7f0000000000)='./file0\x00') sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r2 = io_uring_setup(0x5456, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000004c0)=""/228, 0xe4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e25, 0x10002, @local, 0x3}, r5}}, 0x30) msgget$private(0x0, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e28, 0x711, @private1, 0x206}, {0xa, 0x4e21, 0x0, @empty, 0x8}, r5, 0x403}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r5, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x1, 0x1, "4ca4625e00b5aa95a443d782d859cb2df816a3bc9bd3bf1d11d8b4a7ba9fc6dfb72a8a253215874b349abc806123fd11b1d23eb79cf0385a4cd7b494621f0b26b593bbccdfdf13dbc79be9e9f18b5fb46b9d5a74d7a6dd151c0f37b9e89825f2f99217fb0091568ce14c98b5b462555908260a0e7c7c33fc1ba12df6d0d8fc11847c4b29bd4752fa53802767e26e11475a905215a4d1cfb8a8cc88d605e68145d97c3c2836b7935b66b3583d6633efe51a9cb5426092d85d47a8ca52fe5b7c2083596186c5b4e98f1052759d2233c3fb1e62e4333f0898f89b770b6abe57c92ba6f0e1c64a714686c6f22f7c8f6f79ee56c56d09e95001654229a197d0462e6f", 0x2, 0x4, 0x5, 0xf, 0xd, 0x0, 0x6, 0x1}, r5}}, 0x120) close_range(r2, 0xffffffffffffffff, 0x0) r6 = syz_clone(0x20300000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r6, &(0x7f0000000200)='wchan\x00') ioprio_set$pid(0x1, r6, 0x6000) sendfile(r1, r1, &(0x7f00000000c0)=0x8000000008, 0xfffffffffffffffd) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x105000, 0x0)