fffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000180)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0xbea9, 0x1, "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", 0xff, 0x81, 0x0, 0xb9, 0x8, 0x20, 0x7f, 0x1}, r3}}, 0x120) 07:48:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async, rerun: 32) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x81) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async, rerun: 64) getsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async, rerun: 64) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000), 0x4) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000180)=0x2, 0x4) (async) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000180)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0xbea9, 0x1, "977b05f4a9050b6b2b9bbb3c714df4587bc2d843e10434d6b388d06e20b1326a06269fe5c3ccac7d3251425341408efa621c21c62c30ccb86a778aa63a7b883ab139a83aa57ab9bbc84ec46eb5e54f005961ba91c36e7fc7a81e8c351f68b73ffd2021d79022cdedca092df32c35768e3a22fb1dbffc8f67e5887a6fe2707a48b5035b66d045d873779477c798ee8d23c6d502b44147f45f004346891bbd5e9a8e86fa693f5e4c13165be79e2a40c44fcc6d8e4d7e25cd47b861e7275f091657bd11b882772eac817cb069253509d462ee468e1b5e3c0a3486e901d1dfd1f045de217b14e24240b00954b7b14d689c54ee63e43f0e436348c1ba32c0d6bbff06", 0xff, 0x81, 0x0, 0xb9, 0x8, 0x20, 0x7f, 0x1}, r3}}, 0x120) 07:48:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x402}}, 0xfffffdef) 07:48:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x0, 0x70bd28, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}}, 0x4000000) (async) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x0, 0x70bd28, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}}, 0x4000000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:37 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x88103, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_delroute={0x34, 0x19, 0x400, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x80, 0x1f, 0xfe, 0x1, 0xfe, 0x3, 0x3200}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_EXPIRES={0x8, 0x17, 0x7}]}, 0x34}}, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x81) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000000), 0x4) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000180)=0x2, 0x4) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0xbea9, 0x1, "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", 0xff, 0x81, 0x0, 0xb9, 0x8, 0x20, 0x7f, 0x1}, r3}}, 0x120) [ 2292.466955][T23122] FAULT_INJECTION: forcing a failure. [ 2292.466955][T23122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2292.480290][T23122] CPU: 1 PID: 23122 Comm: syz-executor.0 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2292.490353][T23122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2292.500405][T23122] Call Trace: [ 2292.503687][T23122] [ 2292.506612][T23122] dump_stack_lvl+0xda/0x130 [ 2292.511343][T23122] dump_stack+0x15/0x20 07:48:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0xfffffffffffffefc, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x8}}}, 0xcd) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2292.515513][T23122] should_fail_ex+0x21f/0x230 [ 2292.520221][T23122] __should_fail_alloc_page+0xfd/0x110 [ 2292.525707][T23122] __alloc_pages+0x108/0x340 [ 2292.530434][T23122] vma_alloc_folio+0x6a3/0x8c0 [ 2292.535218][T23122] ? shmem_inode_acct_block+0x1ee/0x220 [ 2292.540872][T23122] shmem_get_folio_gfp+0x579/0xc30 [ 2292.546096][T23122] shmem_write_begin+0xa6/0x210 [ 2292.551021][T23122] generic_perform_write+0x1c9/0x410 [ 2292.556348][T23122] ? shmem_write_begin+0x210/0x210 [ 2292.561484][T23122] shmem_file_write_iter+0xc8/0xe0 [ 2292.566634][T23122] vfs_write+0x4ab/0x7d0 [ 2292.570941][T23122] ksys_write+0xeb/0x1a0 [ 2292.575186][T23122] __x64_sys_write+0x42/0x50 [ 2292.579820][T23122] do_syscall_64+0x41/0xc0 [ 2292.584363][T23122] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2292.591479][T23122] RIP: 0033:0x7f9a0fba0ae9 [ 2292.595910][T23122] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2292.615576][T23122] RSP: 002b:00007f9a0ef230c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2292.623989][T23122] RAX: ffffffffffffffda RBX: 00007f9a0fcbff80 RCX: 00007f9a0fba0ae9 [ 2292.632034][T23122] RDX: 00000000fffffdef RSI: 0000000020000140 RDI: 0000000000000003 [ 2292.640023][T23122] RBP: 00007f9a0ef23120 R08: 0000000000000000 R09: 0000000000000000 [ 2292.647992][T23122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2292.655964][T23122] R13: 000000000000000b R14: 00007f9a0fcbff80 R15: 00007ffee6da6d78 07:48:37 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (fail_nth: 65) 07:48:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004841}, 0x20004004) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, r3, 0x800, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x20, 0x17, {0x1a, 0x3f, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}}}, ["", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4041}, 0x20000) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x9, 0x800, "cb839e8779b6ea24b2bc2b6794eb91e733ae5a1a63130c2c5072729d6d74dcef11ff01e332c67fc0add8d91e45ee3d3d2a3be1206ed32dcf5b391defd619398d010bed02688d2c714fc6746a9d7d7babc0c4e84f76228cd7c35f7220d52fbbded39c16bac93846ce5c9553340d28393bfb085bd861e797c705ee7db6bc04b798801f1f632f53ef6d6d2f2e54f1554bc3534f15a0464b0242862102a8d44e3b4dfa79c6f743ea95c1945a8dbf52e640d09188dbb72684293cc572b3e316604bd811ce2a50a6409a1f4ab11d3a3c6387a581cee72286c0f35b4f6526d95e56cf817f7528c7bb47c0a0de74d3c703590714c0604946504199291841f3469c080310", 0x9, 0x7f, 0x1, 0x20, 0x80, 0x1, 0x81, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) connect$nfc_raw(r0, &(0x7f0000000200)={0x27, 0x0, 0xffffffffffffffff, 0x4}, 0x10) 07:48:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0xfffffffffffffefc, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x8}}}, 0xcd) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:37 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x88103, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_delroute={0x34, 0x19, 0x400, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x80, 0x1f, 0xfe, 0x1, 0xfe, 0x3, 0x3200}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_EXPIRES={0x8, 0x17, 0x7}]}, 0x34}}, 0x40) (async) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_delroute={0x34, 0x19, 0x400, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x80, 0x1f, 0xfe, 0x1, 0xfe, 0x3, 0x3200}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_EXPIRES={0x8, 0x17, 0x7}]}, 0x34}}, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:37 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x88103, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_delroute={0x34, 0x19, 0x400, 0x70bd2a, 0x25dfdbfd, {0xa, 0x0, 0x80, 0x1f, 0xfe, 0x1, 0xfe, 0x3, 0x3200}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_EXPIRES={0x8, 0x17, 0x7}]}, 0x34}}, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) [ 2292.662779][T23137] tipc: Enabling of bearer rejected, already enabled [ 2292.664004][T23122] [ 2292.688076][T23143] FAULT_INJECTION: forcing a failure. [ 2292.688076][T23143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2292.701184][T23143] CPU: 1 PID: 23143 Comm: syz-executor.0 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 07:48:37 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x56101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) [ 2292.711259][T23143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2292.721320][T23143] Call Trace: [ 2292.724599][T23143] [ 2292.727530][T23143] dump_stack_lvl+0xda/0x130 [ 2292.732196][T23143] dump_stack+0x15/0x20 [ 2292.736452][T23143] should_fail_ex+0x21f/0x230 [ 2292.741144][T23143] should_fail+0xb/0x10 [ 2292.745311][T23143] should_fail_usercopy+0x1a/0x20 [ 2292.750421][T23143] copy_page_from_iter_atomic+0x21c/0xcf0 [ 2292.756171][T23143] ? shmem_write_begin+0xa6/0x210 [ 2292.761233][T23143] ? shmem_write_begin+0x16d/0x210 [ 2292.766366][T23143] generic_perform_write+0x20c/0x410 [ 2292.771761][T23143] ? shmem_write_begin+0x210/0x210 [ 2292.776883][T23143] shmem_file_write_iter+0xc8/0xe0 [ 2292.782013][T23143] vfs_write+0x4ab/0x7d0 [ 2292.786269][T23143] ksys_write+0xeb/0x1a0 [ 2292.790519][T23143] __x64_sys_write+0x42/0x50 [ 2292.795112][T23143] do_syscall_64+0x41/0xc0 [ 2292.799619][T23143] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2292.805532][T23143] RIP: 0033:0x7f9a0fba0ae9 07:48:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x406}}, 0xfffffdef) 07:48:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"1f3c4bfadd38b82231a4ffc71fdc307f", 0x0, 0x0, {0x1f, 0x5}, {0x0, 0x9}, 0x7, [0x9, 0x7, 0x58eca398, 0x3dcd, 0x4, 0x3, 0x1, 0x0, 0x53a, 0x1, 0x3, 0x6, 0x4406, 0x400, 0x7c, 0xfff]}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x414000, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000007c0), &(0x7f0000000800)=0x4) sendmsg$nl_route(r3, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=@getneightbl={0x14, 0x42, 0x10, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000000)) r4 = socket(0x5, 0x1, 0x22) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@getnetconf={0x14, 0x52, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x10040080) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, &(0x7f0000000740)=[{0x1, 0x1, {0x2}, {0x2, 0xf0, 0x3}, 0xff, 0x1}, {0x3, 0x0, {0x2, 0xff, 0x1}, {0x2, 0x0, 0x2}, 0x1, 0xff}, {0x2, 0x0, {0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}, 0x2, 0xfd}], 0x60) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r2) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r6, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000090}, 0x40001) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000074580ddb6eabe95e0727da7b071dfc43c592069b1f298b98d0041e4ce29e1c75e98ecc037b3f45a15c315688fdd712ab6a131b3fcb3b13347f54841e8e9bd7c21334691c844f69686ccc7905", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000814100000018001700"/46], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x4004800) 07:48:37 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x56101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:37 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0xfffffffffffffefc, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x8}}}, 0xcd) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:37 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004841}, 0x20004004) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) (async, rerun: 32) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, r3, 0x800, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x20, 0x17, {0x1a, 0x3f, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}}}, ["", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4041}, 0x20000) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x9, 0x800, "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", 0x9, 0x7f, 0x1, 0x20, 0x80, 0x1, 0x81, 0x1}}}, 0x120) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) connect$nfc_raw(r0, &(0x7f0000000200)={0x27, 0x0, 0xffffffffffffffff, 0x4}, 0x10) 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"1f3c4bfadd38b82231a4ffc71fdc307f", 0x0, 0x0, {0x1f, 0x5}, {0x0, 0x9}, 0x7, [0x9, 0x7, 0x58eca398, 0x3dcd, 0x4, 0x3, 0x1, 0x0, 0x53a, 0x1, 0x3, 0x6, 0x4406, 0x400, 0x7c, 0xfff]}) (rerun: 64) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x414000, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000007c0), &(0x7f0000000800)=0x4) (async) sendmsg$nl_route(r3, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=@getneightbl={0x14, 0x42, 0x10, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) (async) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000000)) (rerun: 32) r4 = socket(0x5, 0x1, 0x22) (async, rerun: 64) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 64) getsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@getnetconf={0x14, 0x52, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x10040080) (async) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, &(0x7f0000000740)=[{0x1, 0x1, {0x2}, {0x2, 0xf0, 0x3}, 0xff, 0x1}, {0x3, 0x0, {0x2, 0xff, 0x1}, {0x2, 0x0, 0x2}, 0x1, 0xff}, {0x2, 0x0, {0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}, 0x2, 0xfd}], 0x60) (async) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r2) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r6, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000090}, 0x40001) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000074580ddb6eabe95e0727da7b071dfc43c592069b1f298b98d0041e4ce29e1c75e98ecc037b3f45a15c315688fdd712ab6a131b3fcb3b13347f54841e8e9bd7c21334691c844f69686ccc7905", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000814100000018001700"/46], 0x34}}, 0x0) (async, rerun: 32) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x4004800) (rerun: 32) [ 2292.810146][T23143] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2292.831814][T23143] RSP: 002b:00007f9a0ef230c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2292.840235][T23143] RAX: ffffffffffffffda RBX: 00007f9a0fcbff80 RCX: 00007f9a0fba0ae9 [ 2292.848281][T23143] RDX: 00000000fffffdef RSI: 0000000020000140 RDI: 0000000000000003 [ 2292.856334][T23143] RBP: 00007f9a0ef23120 R08: 0000000000000000 R09: 0000000000000000 [ 2292.864315][T23143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2292.872304][T23143] R13: 000000000000000b R14: 00007f9a0fcbff80 R15: 00007ffee6da6d78 [ 2292.880289][T23143] 07:48:38 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (fail_nth: 66) 07:48:38 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) (async) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"1f3c4bfadd38b82231a4ffc71fdc307f", 0x0, 0x0, {0x1f, 0x5}, {0x0, 0x9}, 0x7, [0x9, 0x7, 0x58eca398, 0x3dcd, 0x4, 0x3, 0x1, 0x0, 0x53a, 0x1, 0x3, 0x6, 0x4406, 0x400, 0x7c, 0xfff]}) socket$inet_udplite(0x2, 0x2, 0x88) (async) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x414000, 0x0) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f00000007c0), &(0x7f0000000800)=0x4) sendmsg$nl_route(r3, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=@getneightbl={0x14, 0x42, 0x10, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) (async) sendmsg$nl_route(r3, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=@getneightbl={0x14, 0x42, 0x10, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000000)) r4 = socket(0x5, 0x1, 0x22) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@getnetconf={0x14, 0x52, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x10040080) (async) sendmsg$nl_route(r5, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@getnetconf={0x14, 0x52, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x10040080) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, &(0x7f0000000740)=[{0x1, 0x1, {0x2}, {0x2, 0xf0, 0x3}, 0xff, 0x1}, {0x3, 0x0, {0x2, 0xff, 0x1}, {0x2, 0x0, 0x2}, 0x1, 0xff}, {0x2, 0x0, {0x0, 0x0, 0x1}, {0x0, 0x1, 0x1}, 0x2, 0xfd}], 0x60) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r2) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r6, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000090}, 0x40001) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000074580ddb6eabe95e0727da7b071dfc43c592069b1f298b98d0041e4ce29e1c75e98ecc037b3f45a15c315688fdd712ab6a131b3fcb3b13347f54841e8e9bd7c21334691c844f69686ccc7905", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000814100000018001700"/46], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x4, 0x70bd28, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x4004800) 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) (rerun: 64) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004841}, 0x20004004) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, r3, 0x800, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x20, 0x17, {0x1a, 0x3f, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}}}, ["", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4041}, 0x20000) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x9, 0x800, "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", 0x9, 0x7f, 0x1, 0x20, 0x80, 0x1, 0x81, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) connect$nfc_raw(r0, &(0x7f0000000200)={0x27, 0x0, 0xffffffffffffffff, 0x4}, 0x10) 07:48:38 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x56101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x56101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:38 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) [ 2293.048493][T23193] FAULT_INJECTION: forcing a failure. [ 2293.048493][T23193] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2293.061769][T23193] CPU: 0 PID: 23193 Comm: syz-executor.0 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2293.071903][T23193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2293.081972][T23193] Call Trace: [ 2293.085259][T23193] [ 2293.088194][T23193] dump_stack_lvl+0xda/0x130 [ 2293.092806][T23193] dump_stack+0x15/0x20 07:48:38 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x500}}, 0xfffffdef) 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4b40, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x40, 0x700, 0x401, 0x10000, {{0x3c, 0x4, 0x3, 0x4, 0xf0, 0x66, 0x0, 0x7f, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_addr={0x44, 0x44, 0xa1, 0x1, 0x2, [{@remote, 0x7}, {@multicast2, 0xfffffff7}, {@remote, 0x1}, {@remote, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x4}, {@broadcast, 0x10001}]}, @generic={0x89, 0xc, "bb95881a38b75cfefb3f"}, @ssrr={0x89, 0xb, 0x6d, [@loopback, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x2c, 0xb, 0x3, 0xe, [{@private=0xa010101, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x400}, {@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xe0}, {@multicast2, 0xff}]}, @ssrr={0x89, 0x13, 0xd2, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast2]}, @timestamp_addr={0x44, 0x2c, 0x2, 0x1, 0x7, [{@multicast2, 0x5}, {@private=0xa010100, 0x9a}, {@empty, 0x2}, {@private=0xa010101, 0x200}, {@local, 0x86a8}]}, @timestamp_prespec={0x44, 0x14, 0xa4, 0x3, 0x1, [{@empty, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}}}}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000540)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv6_deladdrlabel={0x24, 0x49, 0x10, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x1, 0x0, r2, 0x2}, [@IFAL_LABEL={0x8, 0x2, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000580)={0x7, 0x8}, 0x10) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @multicast, 'vxcan1\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) read$qrtrtun(r4, &(0x7f0000000440)=""/133, 0x85) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10}, 0x18) 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000017b1ad66be58e71e1c666dbf3833", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:38 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000017b1ad66be58e71e1c666dbf3833", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000017b1ad66be58e71e1c666dbf3833", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) [ 2293.097038][T23193] should_fail_ex+0x21f/0x230 [ 2293.101787][T23193] __should_fail_alloc_page+0xfd/0x110 [ 2293.107261][T23193] __alloc_pages+0x108/0x340 [ 2293.111866][T23193] vma_alloc_folio+0x6a3/0x8c0 [ 2293.116704][T23193] ? shmem_inode_acct_block+0x1ee/0x220 [ 2293.122270][T23193] shmem_get_folio_gfp+0x579/0xc30 [ 2293.127555][T23193] shmem_write_begin+0xa6/0x210 [ 2293.132419][T23193] generic_perform_write+0x1c9/0x410 [ 2293.137817][T23193] ? shmem_write_begin+0x210/0x210 [ 2293.142948][T23193] shmem_file_write_iter+0xc8/0xe0 [ 2293.148078][T23193] vfs_write+0x4ab/0x7d0 [ 2293.152349][T23193] ksys_write+0xeb/0x1a0 [ 2293.156612][T23193] __x64_sys_write+0x42/0x50 [ 2293.161240][T23193] do_syscall_64+0x41/0xc0 [ 2293.165700][T23193] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2293.171658][T23193] RIP: 0033:0x7f9a0fba0ae9 [ 2293.176069][T23193] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:48:38 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (fail_nth: 67) 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000017b1ad66be58e71e1c666dbf3833", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:38 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socket$can_j1939(0x1d, 0x2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x33, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r3, 0x0, 0x1, @in6={0xa, 0x4e21, 0x100, @loopback, 0x3}}}, 0xa0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0x0, &(0x7f0000000000), 0x4003) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10}, 0x18) (async) 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4b40, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x40, 0x700, 0x401, 0x10000, {{0x3c, 0x4, 0x3, 0x4, 0xf0, 0x66, 0x0, 0x7f, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_addr={0x44, 0x44, 0xa1, 0x1, 0x2, [{@remote, 0x7}, {@multicast2, 0xfffffff7}, {@remote, 0x1}, {@remote, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x4}, {@broadcast, 0x10001}]}, @generic={0x89, 0xc, "bb95881a38b75cfefb3f"}, @ssrr={0x89, 0xb, 0x6d, [@loopback, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x2c, 0xb, 0x3, 0xe, [{@private=0xa010101, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x400}, {@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xe0}, {@multicast2, 0xff}]}, @ssrr={0x89, 0x13, 0xd2, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast2]}, @timestamp_addr={0x44, 0x2c, 0x2, 0x1, 0x7, [{@multicast2, 0x5}, {@private=0xa010100, 0x9a}, {@empty, 0x2}, {@private=0xa010101, 0x200}, {@local, 0x86a8}]}, @timestamp_prespec={0x44, 0x14, 0xa4, 0x3, 0x1, [{@empty, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}}}}) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000540)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) (async, rerun: 64) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv6_deladdrlabel={0x24, 0x49, 0x10, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x1, 0x0, r2, 0x2}, [@IFAL_LABEL={0x8, 0x2, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8) (rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000580)={0x7, 0x8}, 0x10) (async) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @multicast, 'vxcan1\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) read$qrtrtun(r4, &(0x7f0000000440)=""/133, 0x85) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2293.195713][T23193] RSP: 002b:00007f9a0ef230c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2293.204153][T23193] RAX: ffffffffffffffda RBX: 00007f9a0fcbff80 RCX: 00007f9a0fba0ae9 [ 2293.212200][T23193] RDX: 00000000fffffdef RSI: 0000000020000140 RDI: 0000000000000003 [ 2293.220171][T23193] RBP: 00007f9a0ef23120 R08: 0000000000000000 R09: 0000000000000000 [ 2293.228819][T23193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2293.236792][T23193] R13: 000000000000000b R14: 00007f9a0fcbff80 R15: 00007ffee6da6d78 [ 2293.244842][T23193] [ 2293.271208][T23221] FAULT_INJECTION: forcing a failure. [ 2293.271208][T23221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2293.284313][T23221] CPU: 1 PID: 23221 Comm: syz-executor.0 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2293.294423][T23221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2293.299706][T23226] tipc: Enabling of bearer rejected, failed to enable media [ 2293.304500][T23221] Call Trace: [ 2293.304510][T23221] 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x18, 0x13, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x24040011) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x2, 0x70bd29, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xb19d, 0x4, 0x4, 0xd4}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008081}, 0x448c0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:38 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x600}}, 0xfffffdef) 07:48:38 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socket$can_j1939(0x1d, 0x2, 0x7) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x33, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r3, 0x0, 0x1, @in6={0xa, 0x4e21, 0x100, @loopback, 0x3}}}, 0xa0) (async) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0x0, &(0x7f0000000000), 0x4003) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x18, 0x13, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x24040011) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x2, 0x70bd29, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xb19d, 0x4, 0x4, 0xd4}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008081}, 0x448c0) (async, rerun: 64) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (rerun: 64) 07:48:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10}, 0x18) [ 2293.304516][T23221] dump_stack_lvl+0xda/0x130 [ 2293.323464][T23221] dump_stack+0x15/0x20 [ 2293.326888][T23226] tipc: Enabling of bearer rejected, already enabled [ 2293.327643][T23221] should_fail_ex+0x21f/0x230 [ 2293.340222][T23221] should_fail+0xb/0x10 [ 2293.344392][T23221] should_fail_usercopy+0x1a/0x20 [ 2293.349430][T23221] copy_page_from_iter_atomic+0x21c/0xcf0 [ 2293.355201][T23221] ? shmem_write_begin+0xa6/0x210 [ 2293.360285][T23221] ? shmem_write_begin+0x16d/0x210 [ 2293.365493][T23221] generic_perform_write+0x20c/0x410 [ 2293.370802][T23221] ? shmem_write_begin+0x210/0x210 [ 2293.375928][T23221] shmem_file_write_iter+0xc8/0xe0 [ 2293.381057][T23221] vfs_write+0x4ab/0x7d0 [ 2293.385309][T23221] ksys_write+0xeb/0x1a0 [ 2293.389660][T23221] __x64_sys_write+0x42/0x50 [ 2293.394257][T23221] do_syscall_64+0x41/0xc0 [ 2293.398744][T23221] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2293.404643][T23221] RIP: 0033:0x7f9a0fba0ae9 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4b40, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x40, 0x700, 0x401, 0x10000, {{0x3c, 0x4, 0x3, 0x4, 0xf0, 0x66, 0x0, 0x7f, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_addr={0x44, 0x44, 0xa1, 0x1, 0x2, [{@remote, 0x7}, {@multicast2, 0xfffffff7}, {@remote, 0x1}, {@remote, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x4}, {@broadcast, 0x10001}]}, @generic={0x89, 0xc, "bb95881a38b75cfefb3f"}, @ssrr={0x89, 0xb, 0x6d, [@loopback, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x2c, 0xb, 0x3, 0xe, [{@private=0xa010101, 0x6}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x400}, {@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xe0}, {@multicast2, 0xff}]}, @ssrr={0x89, 0x13, 0xd2, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @multicast2]}, @timestamp_addr={0x44, 0x2c, 0x2, 0x1, 0x7, [{@multicast2, 0x5}, {@private=0xa010100, 0x9a}, {@empty, 0x2}, {@private=0xa010101, 0x200}, {@local, 0x86a8}]}, @timestamp_prespec={0x44, 0x14, 0xa4, 0x3, 0x1, [{@empty, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}}}}) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000540)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) (async, rerun: 64) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=@ipv6_deladdrlabel={0x24, 0x49, 0x10, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x1, 0x0, r2, 0x2}, [@IFAL_LABEL={0x8, 0x2, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x8) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000580)={0x7, 0x8}, 0x10) (async, rerun: 32) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x0, @multicast, 'vxcan1\x00'}}, 0x1e) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 64) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) read$qrtrtun(r4, &(0x7f0000000440)=""/133, 0x85) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) [ 2293.409067][T23221] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2293.428755][T23221] RSP: 002b:00007f9a0ef230c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2293.437273][T23221] RAX: ffffffffffffffda RBX: 00007f9a0fcbff80 RCX: 00007f9a0fba0ae9 [ 2293.445270][T23221] RDX: 00000000fffffdef RSI: 0000000020000140 RDI: 0000000000000003 [ 2293.453243][T23221] RBP: 00007f9a0ef23120 R08: 0000000000000000 R09: 0000000000000000 [ 2293.461219][T23221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2293.469204][T23221] R13: 000000000000000b R14: 00007f9a0fcbff80 R15: 00007ffee6da6d78 [ 2293.477190][T23221] [ 2293.490381][T23244] tipc: Enabling of bearer rejected, failed to enable media [ 2293.522350][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.530387][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.538327][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.546441][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.554488][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.562591][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.570539][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.578494][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.586540][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.594531][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.602562][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.610552][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.618561][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.626555][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.634651][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.642710][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.650660][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.658606][T23247] tipc: Enabling of bearer rejected, already enabled 07:48:38 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (fail_nth: 68) 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:38 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socket$can_j1939(0x1d, 0x2, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x33, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r3, 0x0, 0x1, @in6={0xa, 0x4e21, 0x100, @loopback, 0x3}}}, 0xa0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0x0, &(0x7f0000000000), 0x4003) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) socket$can_j1939(0x1d, 0x2, 0x7) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x33, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r3, 0x0, 0x1, @in6={0xa, 0x4e21, 0x100, @loopback, 0x3}}}, 0xa0) (async) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0x0, &(0x7f0000000000), 0x4003) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/power/disk', 0x10806, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_trace_dev_match', 0x101801, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x141, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/kernel', 0x408000, 0x88) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x7521ae4f5ea29123, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_WANTACK(r5, 0x0, 0x0, &(0x7f0000000400), 0x4) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 07:48:38 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x604}}, 0xfffffdef) 07:48:38 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/power/disk', 0x10806, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_trace_dev_match', 0x101801, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x141, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/kernel', 0x408000, 0x88) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x7521ae4f5ea29123, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_WANTACK(r5, 0x0, 0x0, &(0x7f0000000400), 0x4) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 07:48:38 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2293.666741][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.674914][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.682974][T23247] tipc: Enabling of bearer rejected, already enabled 07:48:38 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x20, 0x0, @in6={0xa, 0x4e24, 0x8, @empty, 0x3}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) [ 2293.729333][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.737438][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.760617][T23268] FAULT_INJECTION: forcing a failure. [ 2293.760617][T23268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2293.773852][T23268] CPU: 1 PID: 23268 Comm: syz-executor.0 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2293.784011][T23268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2293.794184][T23268] Call Trace: [ 2293.797471][T23268] [ 2293.800468][T23268] dump_stack_lvl+0xda/0x130 [ 2293.801045][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.805131][T23268] dump_stack+0x15/0x20 [ 2293.814009][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.817188][T23268] should_fail_ex+0x21f/0x230 [ 2293.825655][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.829712][T23268] __should_fail_alloc_page+0xfd/0x110 [ 2293.840208][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.843046][T23268] __alloc_pages+0x108/0x340 [ 2293.851689][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.855483][T23268] vma_alloc_folio+0x6a3/0x8c0 [ 2293.863905][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.868173][T23268] ? shmem_inode_acct_block+0x1ee/0x220 [ 2293.876807][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.881557][T23268] shmem_get_folio_gfp+0x579/0xc30 [ 2293.881593][T23268] shmem_write_begin+0xa6/0x210 [ 2293.890490][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.894536][T23268] generic_perform_write+0x1c9/0x410 [ 2293.894562][T23268] ? shmem_write_begin+0x210/0x210 [ 2293.900328][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.907234][T23268] shmem_file_write_iter+0xc8/0xe0 [ 2293.914404][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.917606][T23268] vfs_write+0x4ab/0x7d0 [ 2293.925646][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.930595][T23268] ksys_write+0xeb/0x1a0 [ 2293.939716][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.942709][T23268] __x64_sys_write+0x42/0x50 [ 2293.951085][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.954797][T23268] do_syscall_64+0x41/0xc0 [ 2293.963347][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.967256][T23268] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2293.967280][T23268] RIP: 0033:0x7f9a0fba0ae9 [ 2293.975862][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.979544][T23268] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2293.979564][T23268] RSP: 002b:00007f9a0ef230c8 EFLAGS: 00000246 [ 2293.988166][T23247] tipc: Enabling of bearer rejected, already enabled [ 2293.993336][T23268] ORIG_RAX: 0000000000000001 [ 2294.000898][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.005630][T23268] RAX: ffffffffffffffda RBX: 00007f9a0fcbff80 RCX: 00007f9a0fba0ae9 [ 2294.005645][T23268] RDX: 00000000fffffdef RSI: 0000000020000140 RDI: 0000000000000003 [ 2294.005658][T23268] RBP: 00007f9a0ef23120 R08: 0000000000000000 R09: 0000000000000000 [ 2294.028211][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.031282][T23268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2294.031296][T23268] R13: 000000000000000b R14: 00007f9a0fcbff80 R15: 00007ffee6da6d78 [ 2294.031314][T23268] [ 2294.040730][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.124055][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.133824][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.145900][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.154050][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.162132][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.170089][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.178014][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.186132][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.194132][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.202161][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.210119][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.218099][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.226104][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.234132][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.242128][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.250178][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.258160][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.266124][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.274088][T23247] tipc: Enabling of bearer rejected, already enabled 07:48:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x18, 0x13, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x24040011) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x2, 0x70bd29, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xb19d, 0x4, 0x4, 0xd4}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008081}, 0x448c0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x300, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x18, 0x13, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x24040011) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x2, 0x70bd29, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0xb19d, 0x4, 0x4, 0xd4}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008081}, 0x448c0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/power/disk', 0x10806, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_trace_dev_match', 0x101801, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x141, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/kernel', 0x408000, 0x88) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x7521ae4f5ea29123, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) (async) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x7521ae4f5ea29123, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_WANTACK(r5, 0x0, 0x0, &(0x7f0000000400), 0x4) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r4, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:39 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (fail_nth: 69) [ 2294.282028][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.290148][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.298108][T23247] tipc: Enabling of bearer rejected, already enabled [ 2294.306087][T23247] tipc: Enabling of bearer rejected, already enabled 07:48:39 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x20, 0x0, @in6={0xa, 0x4e24, 0x8, @empty, 0x3}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x810}}, 0xfffffdef) 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x20, 0x0, @in6={0xa, 0x4e24, 0x8, @empty, 0x3}}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x20, 0x0, @in6={0xa, 0x4e24, 0x8, @empty, 0x3}}}, 0x90) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xa8380, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0xd0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r3, 0x20, &(0x7f00000001c0)={&(0x7f0000000900)=""/4096, 0x1000, 0x0, &(0x7f00000000c0)=""/248, 0xf8}}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, r2, 0x4}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r4, 0x5}}, 0x10) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (rerun: 32) 07:48:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x400, 0x9071, 0x6, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/typec', 0x600000, 0x120) setsockopt$WPAN_SECURITY_LEVEL(r5, 0x0, 0x2, &(0x7f0000000040)=0x1, 0x4) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffffb}}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_RENAMEAT={0x23, 0x8, 0x0, r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', r0}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/module/sg', 0x101000, 0x20) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f6, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008082}, 0x20040001) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r4, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r4, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xa8380, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0xd0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r3, 0x20, &(0x7f00000001c0)={&(0x7f0000000900)=""/4096, 0x1000, 0x0, &(0x7f00000000c0)=""/248, 0xf8}}, 0x10) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, r2, 0x4}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) [ 2294.325028][T23273] tipc: Enabling of bearer rejected, failed to enable media [ 2294.339933][T23273] tipc: Enabling of bearer rejected, already enabled [ 2294.355044][T23273] tipc: Enabling of bearer rejected, failed to enable media 07:48:39 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffffb}}, 0x10) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_RENAMEAT={0x23, 0x8, 0x0, r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', r0}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/module/sg', 0x101000, 0x20) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f6, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008082}, 0x20040001) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000000e000000000000000000000623ed51e868f0339d863714655de3cae7663110418d8902ca9469335302eaa69cc769ce9a53fc13f6356041af2366a6a56b57f09fd834f715a9d8f16ee372afdfb117aeae7b2b251e6762d7264d2a4404e61d764a3de7faae5917e6f78007f1104fae54673d8f6d1e92745ee4ede11210bd34bfa78511a708243f849f807e15a18c3608947afed01ba888e5f88c0497d5"], &(0x7f0000000080)=""/172, 0x2a, 0xac, 0x1}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) connect$pppoe(r1, &(0x7f0000000200)={0x18, 0x0, {0x4, @link_local, 'gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x1f, "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", 0x5a, 0xbb, 0x70, 0x3, 0x5, 0x7f, 0x9}, r2}}, 0x128) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000400), 0x2, {0xa, 0x4e22, 0x1e, @empty, 0x3}, r6}}, 0x38) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xa8380, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0xd0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r3, 0x20, &(0x7f00000001c0)={&(0x7f0000000900)=""/4096, 0x1000, 0x0, &(0x7f00000000c0)=""/248, 0xf8}}, 0x10) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, r2, 0x4}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) [ 2294.406820][T23306] tipc: Enabling of bearer rejected, failed to enable media 07:48:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0xc00}}, 0xfffffdef) 07:48:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x400, 0x9071, 0x6, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/typec', 0x600000, 0x120) setsockopt$WPAN_SECURITY_LEVEL(r5, 0x0, 0x2, &(0x7f0000000040)=0x1, 0x4) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000000e000000000000000000000623ed51e868f0339d863714655de3cae7663110418d8902ca9469335302eaa69cc769ce9a53fc13f6356041af2366a6a56b57f09fd834f715a9d8f16ee372afdfb117aeae7b2b251e6762d7264d2a4404e61d764a3de7faae5917e6f78007f1104fae54673d8f6d1e92745ee4ede11210bd34bfa78511a708243f849f807e15a18c3608947afed01ba888e5f88c0497d5"], &(0x7f0000000080)=""/172, 0x2a, 0xac, 0x1}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) connect$pppoe(r1, &(0x7f0000000200)={0x18, 0x0, {0x4, @link_local, 'gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x1f, "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", 0x5a, 0xbb, 0x70, 0x3, 0x5, 0x7f, 0x9}, r2}}, 0x128) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000400), 0x2, {0xa, 0x4e22, 0x1e, @empty, 0x3}, r6}}, 0x38) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000000e000000000000000000000623ed51e868f0339d863714655de3cae7663110418d8902ca9469335302eaa69cc769ce9a53fc13f6356041af2366a6a56b57f09fd834f715a9d8f16ee372afdfb117aeae7b2b251e6762d7264d2a4404e61d764a3de7faae5917e6f78007f1104fae54673d8f6d1e92745ee4ede11210bd34bfa78511a708243f849f807e15a18c3608947afed01ba888e5f88c0497d5"], &(0x7f0000000080)=""/172, 0x2a, 0xac, 0x1}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) connect$pppoe(r1, &(0x7f0000000200)={0x18, 0x0, {0x4, @link_local, 'gre0\x00'}}, 0x1e) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x13f, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x1f, "5a6f02d01a0e36f9cf3fa9a1d9248299d13c9cfbb3b66a36f46c963708f35c4c19ec656f53b19ab84c7e336dacae65ea0ef574c1bfdc3bc171075faf20cc45af47c850d0908731317862bf6631d0598bae274587d2924258e5ac273e9967f49b34996fae6c3b160a45cdab9a2b515ce4fcc353b4f67a729bbc5ecf43ba111b035775fdddd00abadef23846f61dcd0c13c0072974839134d293b2aaff1c2e35225533af53ca4cf1787c3c15e1a2f967535618ee5fdcfabd7451397ca07836d341b393a36aa0ea0db78623df2d5db4edaf3ff0f983c2cf02dcff27dcefaa9ec986917d96fd6e33d4fb4eeb995681ca17af209ad761542452437b5422fa4c6b7013", 0x5a, 0xbb, 0x70, 0x3, 0x5, 0x7f, 0x9}, r2}}, 0x128) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000400), 0x2, {0xa, 0x4e22, 0x1e, @empty, 0x3}, r6}}, 0x38) (async) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x6}}, 0x20) 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffffffb}}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_RENAMEAT={0x23, 0x8, 0x0, r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', r0}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/module/sg', 0x101000, 0x20) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f6, 0x20, 0x70bd2b, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008082}, 0x20040001) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (rerun: 64) 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x10dc00, 0x0) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x6}}, 0x20) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000000e000000000000000000000623ed51e868f0339d863714655de3cae7663110418d8902ca9469335302eaa69cc769ce9a53fc13f6356041af2366a6a56b57f09fd834f715a9d8f16ee372afdfb117aeae7b2b251e6762d7264d2a4404e61d764a3de7faae5917e6f78007f1104fae54673d8f6d1e92745ee4ede11210bd34bfa78511a708243f849f807e15a18c3608947afed01ba888e5f88c0497d5"], &(0x7f0000000080)=""/172, 0x2a, 0xac, 0x1}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) connect$pppoe(r1, &(0x7f0000000200)={0x18, 0x0, {0x4, @link_local, 'gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x1f, "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", 0x5a, 0xbb, 0x70, 0x3, 0x5, 0x7f, 0x9}, r2}}, 0x128) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000400), 0x2, {0xa, 0x4e22, 0x1e, @empty, 0x3}, r6}}, 0x38) [ 2294.563352][T23326] tipc: Enabling of bearer rejected, failed to enable media 07:48:39 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x207, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x10dc00, 0x0) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"8505149967c031496064879e494e83fc"}, 0x0, 0x8001}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x3e8d, 0x4000000, "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", 0xae, 0x3f, 0x3f, 0x3f, 0x7, 0x0, 0x7, 0x1}, r1}}, 0x128) write$cgroup_devices(r0, &(0x7f0000000180)={'b', ' *:* ', 'wm\x00'}, 0x9) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x400, 0x9071, 0x6, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/typec', 0x600000, 0x120) setsockopt$WPAN_SECURITY_LEVEL(r5, 0x0, 0x2, &(0x7f0000000040)=0x1, 0x4) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x400, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x400, 0x9071, 0x6, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x10) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/typec', 0x600000, 0x120) (async) setsockopt$WPAN_SECURITY_LEVEL(r5, 0x0, 0x2, &(0x7f0000000040)=0x1, 0x4) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x6}}, 0x20) [ 2294.670884][T23356] tipc: Enabling of bearer rejected, failed to enable media [ 2294.694279][T23363] tipc: Enabling of bearer rejected, failed to enable media 07:48:39 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x10dc00, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x10dc00, 0x0) 07:48:39 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"8505149967c031496064879e494e83fc"}, 0x0, 0x8001}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"8505149967c031496064879e494e83fc"}, 0x0, 0x8001}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x3e8d, 0x4000000, "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", 0xae, 0x3f, 0x3f, 0x3f, 0x7, 0x0, 0x7, 0x1}, r1}}, 0x128) write$cgroup_devices(r0, &(0x7f0000000180)={'b', ' *:* ', 'wm\x00'}, 0x9) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x4) 07:48:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) 07:48:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x1008}}, 0xfffffdef) 07:48:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"8505149967c031496064879e494e83fc"}, 0x0, 0x8001}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x3e8d, 0x4000000, "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", 0xae, 0x3f, 0x3f, 0x3f, 0x7, 0x0, 0x7, 0x1}, r1}}, 0x128) (async) write$cgroup_devices(r0, &(0x7f0000000180)={'b', ' *:* ', 'wm\x00'}, 0x9) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x20f, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x4) (async) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7, 0x38, 0x1, 0x70c}, {0x7, 0x20, 0x0, 0x9}, {0x7f, 0x3f, 0x84, 0x8}]}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3fb, 0x0, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8084}, 0x4000) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r2, &(0x7f0000000100)=r4, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r5, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000180)=r5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x2ee7, &(0x7f0000000280)={0x0, 0x8f10, 0x4, 0x2, 0x185}, &(0x7f00000001c0), &(0x7f0000000300)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x400800, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000003c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) (async) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) (async) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) (async) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x3ff, 0x5, "08a18703d19532af24d50eefd5b61829287138a3b41a16c78ce6d62dec4ad48129ee477969578803e79690fcf78d86cae585a345bcfc2e30681ae0ad660f55a8bde831d7eb1c1b823bc19efd6826d81ba46aa541995214cdb690bfb513df7aafecd7235f299deade48ef77c029287216057ebdf1c8f7a8020f70bb696b4841e7c34ba637c01a8ee3eea5966c5e4dec7735ce5ab67c851bf790bd551dcc091132aa3f73b3bdfdc7849ed0a24735c4b29a45bb42f63930bc9a6e1524d097b7fea1a3be204f6d2bc6b4cb487f5042ccf4f2f287576b03edf010c48852276255339d58b552023e16615017558e945f7ab8f9745706712a58520e66b2fc7efb944bdf", 0x81, 0x2, 0x1, 0x1f, 0x7, 0x1, 0x9, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0xa0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r4, 0x100}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2294.806447][T23375] tipc: Bearer : already 2 bearers with priority 0 [ 2294.813935][T23375] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x3ff, 0x5, "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", 0x81, 0x2, 0x1, 0x1f, 0x7, 0x1, 0x9, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0xa0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r4, 0x100}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) connect$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x4) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x101543, 0x408) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r2, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x20, 0x17, {0xf, 0xfffffffd, @l2={'ib', 0x3a, 'veth0_macvtap\x00'}}}}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x80, 0x4, "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", 0x5, 0x7f, 0x0, 0x3f, 0x6, 0x3f, 0xe1}}}, 0x120) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7, 0x38, 0x1, 0x70c}, {0x7, 0x20, 0x0, 0x9}, {0x7f, 0x3f, 0x84, 0x8}]}) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3fb, 0x0, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8084}, 0x4000) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r2, &(0x7f0000000100)=r4, 0x12) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r5, 0x469d, 0x800}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000180)=r5) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) syz_io_uring_setup(0x2ee7, &(0x7f0000000280)={0x0, 0x8f10, 0x4, 0x2, 0x185}, &(0x7f00000001c0), &(0x7f0000000300)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000340)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x400800, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000003c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x3ff, 0x5, "08a18703d19532af24d50eefd5b61829287138a3b41a16c78ce6d62dec4ad48129ee477969578803e79690fcf78d86cae585a345bcfc2e30681ae0ad660f55a8bde831d7eb1c1b823bc19efd6826d81ba46aa541995214cdb690bfb513df7aafecd7235f299deade48ef77c029287216057ebdf1c8f7a8020f70bb696b4841e7c34ba637c01a8ee3eea5966c5e4dec7735ce5ab67c851bf790bd551dcc091132aa3f73b3bdfdc7849ed0a24735c4b29a45bb42f63930bc9a6e1524d097b7fea1a3be204f6d2bc6b4cb487f5042ccf4f2f287576b03edf010c48852276255339d58b552023e16615017558e945f7ab8f9745706712a58520e66b2fc7efb944bdf", 0x81, 0x2, 0x1, 0x1f, 0x7, 0x1, 0x9, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0xa0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r4, 0x100}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2294.902273][T23398] tipc: Bearer : already 2 bearers with priority 0 [ 2294.909706][T23398] tipc: Enabling of bearer rejected, cannot adjust to lower [ 2294.921465][T23402] tipc: Bearer : already 2 bearers with priority 0 [ 2294.928858][T23402] tipc: Enabling of bearer rejected, cannot adjust to lower [ 2294.962844][T23405] tipc: Enabling of bearer rejected, failed to enable media 07:48:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0xff01}}, 0xfffffdef) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7, 0x38, 0x1, 0x70c}, {0x7, 0x20, 0x0, 0x9}, {0x7f, 0x3f, 0x84, 0x8}]}) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3fb, 0x0, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8084}, 0x4000) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r2, &(0x7f0000000100)=r4, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r5, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000180)=r5) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) syz_io_uring_setup(0x2ee7, &(0x7f0000000280)={0x0, 0x8f10, 0x4, 0x2, 0x185}, &(0x7f00000001c0), &(0x7f0000000300)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x400800, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000003c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 07:48:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa02, {0x0, 0x0}}, 0xfffffdef) 07:48:40 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x101543, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x101543, 0x408) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r2, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x20, 0x17, {0xf, 0xfffffffd, @l2={'ib', 0x3a, 'veth0_macvtap\x00'}}}}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x80, 0x4, "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", 0x5, 0x7f, 0x0, 0x3f, 0x6, 0x3f, 0xe1}}}, 0x120) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0xc0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x400, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x559c}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async, rerun: 32) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) (async, rerun: 32) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xc683, @loopback, 0x2}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0xfff, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0xc0, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0xc0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x400, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x559c}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xc683, @loopback, 0x2}}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0xfff, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x0, @loopback, 0x1f}, r3}}, 0x38) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000af0fdb6c3506eac40000000000014100000018001700000000000000006574683a697036ffd5ab4867"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="89c828ec6d00000426bd7000fd4cf0db80000000", @ANYRES32=0x0, @ANYBLOB="010800002812000048001a8004001c00400002803c0001800800130001010000080004000100008008001c00620b000008000b000200000008000f0006000000080003000001000008000100008000001d0024004554ed3153d24b3c1a45be8f4d5b56940f4409ff4057ce363d00000013002400599acaffdacd5bec728a9b08b486070008000400040000000a0002003340701c656b0000"], 0xb0}, 0x1, 0x0, 0x0, 0x2400c090}, 0x4000) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x101543, 0x408) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r2, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x20, 0x17, {0xf, 0xfffffffd, @l2={'ib', 0x3a, 'veth0_macvtap\x00'}}}}, [""]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x40000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x80, 0x4, "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", 0x5, 0x7f, 0x0, 0x3f, 0x6, 0x3f, 0xe1}}}, 0x120) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xc683, @loopback, 0x2}}}, 0x38) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0xfff, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x0, @loopback, 0x1f}, r3}}, 0x38) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000af0fdb6c3506eac40000000000014100000018001700000000000000006574683a697036ffd5ab4867"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="89c828ec6d00000426bd7000fd4cf0db80000000", @ANYRES32=0x0, @ANYBLOB="010800002812000048001a8004001c00400002803c0001800800130001010000080004000100008008001c00620b000008000b000200000008000f0006000000080003000001000008000100008000001d0024004554ed3153d24b3c1a45be8f4d5b56940f4409ff4057ce363d00000013002400599acaffdacd5bec728a9b08b486070008000400040000000a0002003340701c656b0000"], 0xb0}, 0x1, 0x0, 0x0, 0x2400c090}, 0x4000) [ 2295.097019][T23437] tipc: Enabling of bearer rejected, failed to enable media [ 2295.151693][T23453] tipc: Enabling of bearer rejected, failed to enable media 07:48:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x0, @loopback, 0x1f}, r3}}, 0x38) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000af0fdb6c3506eac40000000000014100000018001700000000000000006574683a697036ffd5ab4867"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="89c828ec6d00000426bd7000fd4cf0db80000000", @ANYRES32=0x0, @ANYBLOB="010800002812000048001a8004001c00400002803c0001800800130001010000080004000100008008001c00620b000008000b000200000008000f0006000000080003000001000008000100008000001d0024004554ed3153d24b3c1a45be8f4d5b56940f4409ff4057ce363d00000013002400599acaffdacd5bec728a9b08b486070008000400040000000a0002003340701c656b0000"], 0xb0}, 0x1, 0x0, 0x0, 0x2400c090}, 0x4000) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x0, @loopback, 0x1f}, r3}}, 0x38) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000af0fdb6c3506eac40000000000014100000018001700000000000000006574683a697036ffd5ab4867"], 0x34}}, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="89c828ec6d00000426bd7000fd4cf0db80000000", @ANYRES32=0x0, @ANYBLOB="010800002812000048001a8004001c00400002803c0001800800130001010000080004000100008008001c00620b000008000b000200000008000f0006000000080003000001000008000100008000001d0024004554ed3153d24b3c1a45be8f4d5b56940f4409ff4057ce363d00000013002400599acaffdacd5bec728a9b08b486070008000400040000000a0002003340701c656b0000"], 0xb0}, 0x1, 0x0, 0x0, 0x2400c090}, 0x4000) (async) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0xc0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x400, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x559c}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @remote, 0x34}, {0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x800}, 0xffffffffffffffff, 0x4}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0x0, 0x1, 0xc, 0x6}, {0x80, 0x1, 0x3, 0x1}, {0x9, 0x3, 0x8, 0x3f}, {0x1, 0x80, 0x3, 0x7fffffff}, {0x1, 0x5, 0xf3, 0x6}, {0x6, 0x8, 0x5, 0x4}, {0x0, 0x10, 0x2, 0xfffffff7}, {0x3f, 0xb, 0x9, 0xfff}, {0x2c16, 0x80, 0xbe, 0x2}, {0x5, 0x81, 0x3, 0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x0, r7, 0x7, 0x80000}) 07:48:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa04, {0x0, 0x0}}, 0xfffffdef) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={r2, 0x2, r0, 0x7, 0x80000}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @remote, 0x34}, {0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x800}, 0xffffffffffffffff, 0x4}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) (async) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0x0, 0x1, 0xc, 0x6}, {0x80, 0x1, 0x3, 0x1}, {0x9, 0x3, 0x8, 0x3f}, {0x1, 0x80, 0x3, 0x7fffffff}, {0x1, 0x5, 0xf3, 0x6}, {0x6, 0x8, 0x5, 0x4}, {0x0, 0x10, 0x2, 0xfffffff7}, {0x3f, 0xb, 0x9, 0xfff}, {0x2c16, 0x80, 0xbe, 0x2}, {0x5, 0x81, 0x3, 0x6}]}) (async, rerun: 32) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) (rerun: 32) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x0, r7, 0x7, 0x80000}) 07:48:40 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f00000000c0)=[{0x1, 0x1, {0x1, 0x0, 0x3}, {0x1, 0xff, 0x3}, 0xfd, 0x2}, {0x0, 0x2, {0x1, 0x0, 0x2}, {0x1, 0x8ec38c8f23d03585, 0x4}, 0x0, 0x1}, {0x2, 0x3, {0x0, 0x1, 0x1}, {0x2, 0x1, 0x2}, 0xff, 0xfe}, {0x0, 0x2, {0x1, 0xff, 0x4}, {0x0, 0x1, 0x2}, 0x2, 0xfe}], 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/virtio_pci', 0x40, 0x44) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e20, 0x7fffffff, @empty, 0x16}, {0xa, 0x4e24, 0xff, @local, 0x7}, 0x1, {[0x0, 0x1, 0x9, 0x9a8, 0x5, 0x6, 0x9, 0x8]}}, 0x5c) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000140), 0x4) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @remote, 0x34}, {0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x800}, 0xffffffffffffffff, 0x4}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @remote, 0x34}, {0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x800}, 0xffffffffffffffff, 0x4}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={r2, 0x2, r0, 0x7, 0x80000}) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2295.364116][T23494] tipc: Enabling of bearer rejected, already enabled 07:48:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x2}}, 0xfffffdef) 07:48:40 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0x0, 0x1, 0xc, 0x6}, {0x80, 0x1, 0x3, 0x1}, {0x9, 0x3, 0x8, 0x3f}, {0x1, 0x80, 0x3, 0x7fffffff}, {0x1, 0x5, 0xf3, 0x6}, {0x6, 0x8, 0x5, 0x4}, {0x0, 0x10, 0x2, 0xfffffff7}, {0x3f, 0xb, 0x9, 0xfff}, {0x2c16, 0x80, 0xbe, 0x2}, {0x5, 0x81, 0x3, 0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x0, r7, 0x7, 0x80000}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x0, r7, 0x7, 0x80000}) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={r2, 0x2, r0, 0x7, 0x80000}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000040)={r2, 0x2, r0, 0x7, 0x80000}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f00000000c0)=[{0x1, 0x1, {0x1, 0x0, 0x3}, {0x1, 0xff, 0x3}, 0xfd, 0x2}, {0x0, 0x2, {0x1, 0x0, 0x2}, {0x1, 0x8ec38c8f23d03585, 0x4}, 0x0, 0x1}, {0x2, 0x3, {0x0, 0x1, 0x1}, {0x2, 0x1, 0x2}, 0xff, 0xfe}, {0x0, 0x2, {0x1, 0xff, 0x4}, {0x0, 0x1, 0x2}, 0x2, 0xfe}], 0x80) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/virtio_pci', 0x40, 0x44) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e20, 0x7fffffff, @empty, 0x16}, {0xa, 0x4e24, 0xff, @local, 0x7}, 0x1, {[0x0, 0x1, 0x9, 0x9a8, 0x5, 0x6, 0x9, 0x8]}}, 0x5c) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000140), 0x4) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x101, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}}, 0xa0) 07:48:40 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x1ff, 0xc1, "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", 0x9, 0x0, 0x4, 0xfb, 0x40, 0x2, 0x1f}}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x101, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}}, 0xa0) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x300, 0x70bd28, 0x25dfdbff, {0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f00000000c0)=[{0x1, 0x1, {0x1, 0x0, 0x3}, {0x1, 0xff, 0x3}, 0xfd, 0x2}, {0x0, 0x2, {0x1, 0x0, 0x2}, {0x1, 0x8ec38c8f23d03585, 0x4}, 0x0, 0x1}, {0x2, 0x3, {0x0, 0x1, 0x1}, {0x2, 0x1, 0x2}, 0xff, 0xfe}, {0x0, 0x2, {0x1, 0xff, 0x4}, {0x0, 0x1, 0x2}, 0x2, 0xfe}], 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/virtio_pci', 0x40, 0x44) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e20, 0x7fffffff, @empty, 0x16}, {0xa, 0x4e24, 0xff, @local, 0x7}, 0x1, {[0x0, 0x1, 0x9, 0x9a8, 0x5, 0x6, 0x9, 0x8]}}, 0x5c) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) setsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f0000000140), 0x4) 07:48:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa05, {0x0, 0x0}}, 0xfffffdef) [ 2295.469632][T23512] tipc: Enabling of bearer rejected, already enabled 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x300, 0x70bd28, 0x25dfdbff, {0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c891}, 0x800) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}}}}, 0x34}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) [ 2295.576746][T23535] tipc: Bearer : already 2 bearers with priority 0 [ 2295.584472][T23535] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:40 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x1ff, 0xc1, "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", 0x9, 0x0, 0x4, 0xfb, 0x40, 0x2, 0x1f}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x1ff, 0xc1, "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", 0x9, 0x0, 0x4, 0xfb, 0x40, 0x2, 0x1f}}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x101, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x101, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}}, 0xa0) (async) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x300, 0x70bd28, 0x25dfdbff, {0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0xfffffdef) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c891}, 0x800) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}}}}, 0x34}}, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r3) (async) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c891}, 0x800) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}}}}, 0x34}}, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) (async) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @loopback, 0x34a2}, {0xa, 0x4e22, 0x3, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x6}, 0xffffffffffffffff, 0x1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2295.695928][T23551] tipc: Bearer : already 2 bearers with priority 0 [ 2295.703723][T23551] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:40 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x1ff, 0xc1, "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", 0x9, 0x0, 0x4, 0xfb, 0x40, 0x2, 0x1f}}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:40 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa06, {0x0, 0x0}}, 0xfffffdef) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000280)={"42811dd1fbc4276567f84f383f981744", 0x0, 0x0, {0xfffffffffffffffc, 0x8}, {0x7fffffff, 0xc49}, 0x26d, [0x7, 0x7, 0x5, 0x101, 0x3f, 0x4, 0x1, 0x400, 0x0, 0xfe, 0x9, 0x0, 0x200, 0x5, 0x1, 0x2]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"6efdcb2d361ca80d72c3c16110921ac8", 0x0, 0x0, {0x52, 0x4}, {0x6}, 0x1, [0x7fffffff, 0x7fffffffffffffff, 0xe000000000000, 0x43, 0x1, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x6, 0x100000001, 0x7, 0x0, 0x4, 0x1, 0x1]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000480)={"049cb0ae6076b8b6e4b045f0c51f4df1", r3, r4, {0x7f80000, 0x1}, {0x7, 0x1}, 0x3, [0x7ff, 0x1, 0x6, 0x80000000, 0x91e, 0x112, 0xfffffffffffffffe, 0x800, 0x7, 0x1000, 0x6, 0x7f, 0x3, 0x533, 0x6, 0x3]}) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r6, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000800) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0xfe, "de00", "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"}}, 0x110) 07:48:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r3) (async) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x1, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2004c891}, 0x800) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}}}}, 0x34}}, 0x0) (async) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 07:48:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @loopback, 0x34a2}, {0xa, 0x4e22, 0x3, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x6}, 0xffffffffffffffff, 0x1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "000090", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000280)={"42811dd1fbc4276567f84f383f981744", 0x0, 0x0, {0xfffffffffffffffc, 0x8}, {0x7fffffff, 0xc49}, 0x26d, [0x7, 0x7, 0x5, 0x101, 0x3f, 0x4, 0x1, 0x400, 0x0, 0xfe, 0x9, 0x0, 0x200, 0x5, 0x1, 0x2]}) (async, rerun: 32) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"6efdcb2d361ca80d72c3c16110921ac8", 0x0, 0x0, {0x52, 0x4}, {0x6}, 0x1, [0x7fffffff, 0x7fffffffffffffff, 0xe000000000000, 0x43, 0x1, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x6, 0x100000001, 0x7, 0x0, 0x4, 0x1, 0x1]}) (rerun: 32) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000480)={"049cb0ae6076b8b6e4b045f0c51f4df1", r3, r4, {0x7f80000, 0x1}, {0x7, 0x1}, 0x3, [0x7ff, 0x1, 0x6, 0x80000000, 0x91e, 0x112, 0xfffffffffffffffe, 0x800, 0x7, 0x1000, 0x6, 0x7f, 0x3, 0x533, 0x6, 0x3]}) (async, rerun: 32) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async, rerun: 32) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) (rerun: 64) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r6, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000800) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0xfe, "de00", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc17be65fcf7525af3d345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8054a563b8776298f3386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984d0b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "000090", "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"}}, 0x110) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x401, @loopback, 0x34a2}, {0xa, 0x4e22, 0x3, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x6}, 0xffffffffffffffff, 0x1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2295.802707][T23564] tipc: Bearer : already 2 bearers with priority 0 [ 2295.810386][T23564] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @loopback, 0x1}, {0xa, 0x4e20, 0x6, @private2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008090}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f0000000140)=""/249, 0xf9, 0x0, &(0x7f0000000240)=""/229, 0xe5}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r3, 0x4) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "000090", "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"}}, 0x110) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000280)={"42811dd1fbc4276567f84f383f981744", 0x0, 0x0, {0xfffffffffffffffc, 0x8}, {0x7fffffff, 0xc49}, 0x26d, [0x7, 0x7, 0x5, 0x101, 0x3f, 0x4, 0x1, 0x400, 0x0, 0xfe, 0x9, 0x0, 0x200, 0x5, 0x1, 0x2]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"6efdcb2d361ca80d72c3c16110921ac8", 0x0, 0x0, {0x52, 0x4}, {0x6}, 0x1, [0x7fffffff, 0x7fffffffffffffff, 0xe000000000000, 0x43, 0x1, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0x6, 0x100000001, 0x7, 0x0, 0x4, 0x1, 0x1]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000480)={"049cb0ae6076b8b6e4b045f0c51f4df1", r3, r4, {0x7f80000, 0x1}, {0x7, 0x1}, 0x3, [0x7ff, 0x1, 0x6, 0x80000000, 0x91e, 0x112, 0xfffffffffffffffe, 0x800, 0x7, 0x1000, 0x6, 0x7f, 0x3, 0x533, 0x6, 0x3]}) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) (async, rerun: 32) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r6, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000800) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0xfe, "de00", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc17be65fcf7525af3d345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8054a563b8776298f3386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984d0b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (rerun: 32) [ 2295.909628][T23584] tipc: Enabling of bearer rejected, already enabled 07:48:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa08, {0x0, 0x0}}, 0xfffffdef) 07:48:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x5}}, 0xfffffdef) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @loopback, 0x1}, {0xa, 0x4e20, 0x6, @private2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x448fc3, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c705f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542316c67f582f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765c5dd35caa9f405605ef20702d8b83082151e016cc900"}}, 0x110) 07:48:41 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008090}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f0000000140)=""/249, 0xf9, 0x0, &(0x7f0000000240)=""/229, 0xe5}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r3, 0x4) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x3f2, 0x400, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x3f2, 0x400, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x3f2, 0x400, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @loopback, 0x1}, {0xa, 0x4e20, 0x6, @private2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x448fc3, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c705f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542316c67f582f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765c5dd35caa9f405605ef20702d8b83082151e016cc900"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x448fc3, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c705f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542316c67f582f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765c5dd35caa9f405605ef20702d8b83082151e016cc900"}}, 0x110) (async) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x3f2, 0x400, 0x70bd29, 0x25dfdbfc, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x1, 0x7800, 0x3, 0x4, {{0xe, 0x4, 0x0, 0x1f, 0x38, 0x64, 0x0, 0x3, 0x29, 0x0, @rand_addr=0x64010102, @remote, {[@lsrr={0x83, 0x17, 0xbb, [@multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @loopback]}, @lsrr={0x83, 0xb, 0x32, [@multicast1, @broadcast]}]}}}}}) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000001c0)={0x1, 0x0, 0x40, r1, 0x10001}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008090}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f0000000140)=""/249, 0xf9, 0x0, &(0x7f0000000240)=""/229, 0xe5}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r2, 0x20, &(0x7f0000000340)={&(0x7f0000000140)=""/249, 0xf9, 0x0, &(0x7f0000000240)=""/229, 0xe5}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r3, 0x4) [ 2296.006238][T23605] tipc: Enabling of bearer rejected, already enabled [ 2296.062949][T23621] tipc: Enabling of bearer rejected, already enabled [ 2296.073799][T23624] tipc: Enabling of bearer rejected, already enabled 07:48:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa0c, {0x0, 0x0}}, 0xfffffdef) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0x0, "55a6bb", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x4, r2, 0x10, 0x327c989e9c6c0c43, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/cgroup\x00') r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x3}}, 0x20) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x448fc3, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c705f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542316c67f582f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765c5dd35caa9f405605ef20702d8b83082151e016cc900"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x448fc3, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c705f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542316c67f582f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765c5dd35caa9f405605ef20702d8b83082151e016cc900"}}, 0x110) (async) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0xe5736019604da57a) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000806574683a69f19c90fec170366772653000"], 0x34}}, 0x0) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x1, 0x7800, 0x3, 0x4, {{0xe, 0x4, 0x0, 0x1f, 0x38, 0x64, 0x0, 0x3, 0x29, 0x0, @rand_addr=0x64010102, @remote, {[@lsrr={0x83, 0x17, 0xbb, [@multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @loopback]}, @lsrr={0x83, 0xb, 0x32, [@multicast1, @broadcast]}]}}}}}) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000001c0)={0x1, 0x0, 0x40, r1, 0x10001}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x1, 0x7800, 0x3, 0x4, {{0xe, 0x4, 0x0, 0x1f, 0x38, 0x64, 0x0, 0x3, 0x29, 0x0, @rand_addr=0x64010102, @remote, {[@lsrr={0x83, 0x17, 0xbb, [@multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @loopback]}, @lsrr={0x83, 0xb, 0x32, [@multicast1, @broadcast]}]}}}}}) (async) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000001c0)={0x1, 0x0, 0x40, r1, 0x10001}, 0xc) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0xfffffdef) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0x0, "55a6bb", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x4, r2, 0x10, 0x327c989e9c6c0c43, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/cgroup\x00') r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x3}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0x0, "55a6bb", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x4, r2, 0x10, 0x327c989e9c6c0c43, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/cgroup\x00') (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x3}}, 0x20) (async) 07:48:41 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0xe5736019604da57a) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000806574683a69f19c90fec170366772653000"], 0x34}}, 0x0) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x1, 0x7800, 0x3, 0x4, {{0xe, 0x4, 0x0, 0x1f, 0x38, 0x64, 0x0, 0x3, 0x29, 0x0, @rand_addr=0x64010102, @remote, {[@lsrr={0x83, 0x17, 0xbb, [@multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1, @loopback]}, @lsrr={0x83, 0xb, 0x32, [@multicast1, @broadcast]}]}}}}}) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f00000001c0)={0x1, 0x0, 0x40, r1, 0x10001}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r5, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000940), 0x30001, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x42c, 0x3f3, 0x2, 0x70bd2b, 0x25dfdbfd, {0x5, 0x2, 0x34, [0xfffffffc, 0x882, 0x80, 0xeb33, 0x6, 0x80000000, 0x8, 0xb9, 0x2, 0x5, 0x1ff, 0x9d, 0x6, 0x20000000, 0x6, 0x20, 0x10001, 0x1ff, 0x3, 0x2, 0x38, 0xfffff000, 0xfffffe00, 0x80000000, 0xff, 0x6, 0x1, 0xfffffffd, 0xe3, 0x2, 0x0, 0x1, 0x1, 0x3, 0xfffffffe, 0x4, 0x7, 0xfffffffe, 0x9, 0xff21, 0x81, 0x4808, 0xc4d9, 0x6, 0x0, 0x2, 0x1f, 0x2, 0x1, 0xb044, 0x6, 0x5, 0x9a8, 0x4, 0xffff, 0x5, 0x8, 0xfffffff9, 0x3, 0x2, 0x80000001, 0x9, 0x3, 0x2], [0x0, 0x1, 0x4, 0x9, 0xffff, 0x3, 0x3ff, 0x3, 0x6, 0x3a4, 0xff, 0x2, 0x20, 0x7fffffff, 0x8, 0x7ff, 0x6, 0x0, 0x1, 0x3187, 0x6, 0x580b, 0x10001, 0x4, 0xfffff94e, 0x6, 0x10000, 0xf5fd, 0x8, 0xfffffffb, 0x13fed8c, 0x6a2ff2bc, 0x9, 0x2, 0x9d, 0x5, 0xfffff800, 0x0, 0x5, 0x100, 0x10001, 0x1780000, 0x6, 0xfe, 0x5, 0x9, 0xbc, 0x8a59, 0x6, 0x7, 0x1f, 0x1ff, 0x8, 0x9, 0x9, 0xfffffff9, 0x212, 0x1f814104, 0x8, 0x9, 0x5a1, 0x1, 0x55b], [0x40, 0x3b, 0x400, 0xffffff7f, 0x6314, 0x67, 0x200, 0x20, 0x3, 0x1, 0x8000, 0x401, 0x8, 0x1ff, 0x7fffffff, 0x605, 0x8, 0x1, 0x800, 0x1, 0x4, 0x7, 0x3, 0xa78, 0x80000000, 0x9, 0x2, 0x0, 0x3, 0x5, 0x20, 0x3a1, 0x5, 0xfe000, 0x0, 0x81, 0x0, 0x100, 0x401, 0x34ea, 0x1, 0x9, 0x8, 0x1, 0x7, 0x5, 0x7, 0x9, 0x9, 0x5, 0x9, 0x1ae, 0x8000, 0x3, 0x8, 0xb786, 0x9, 0x2bd8d9f1, 0x0, 0x1, 0x7fff, 0x0, 0x80, 0xfffffffd], [0x1, 0x7f, 0x10001, 0x2, 0x81, 0x5, 0x3, 0x4b, 0x80000000, 0xffffffff, 0x6, 0xfffffff9, 0x9, 0xd584, 0x9, 0x5, 0x0, 0x1000, 0xb44, 0x7219, 0x1000, 0x6, 0x3, 0x7, 0x401, 0x8, 0x1, 0x7fffffff, 0x3, 0xfffffffb, 0x81, 0x80000001, 0x9, 0xffffffff, 0x5, 0x9, 0x3, 0xd8f, 0x23225a76, 0x7, 0x4ee, 0x6, 0x4, 0x4c, 0x3, 0x80000000, 0x3, 0x0, 0x3, 0x100, 0x8c88, 0x10000, 0x4, 0x1000, 0x0, 0x4, 0xa1d, 0x4, 0x80000001, 0x0, 0x8, 0x2, 0x7fffffff, 0x6ab], 0xa, ['\x00', '\x00', 'syztnl0\x00']}, ["", "", "", "", ""]}, 0x42c}, 0x1, 0x0, 0x0, 0x810}, 0x20004811) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'syztnl0\x00', r3, 0x1, 0x40, 0x4, 0x401, {{0x17, 0x4, 0x0, 0x1a, 0x5c, 0x66, 0x0, 0x1, 0x4, 0x0, @loopback, @remote, {[@end, @timestamp_prespec={0x44, 0x24, 0xba, 0x3, 0x7, [{@loopback, 0x401}, {@loopback, 0x937}, {@multicast1, 0x1}, {@loopback, 0x401}]}, @noop, @lsrr={0x83, 0x17, 0x8, [@dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty]}, @generic={0x88, 0xa, "59bcee06b63b2b60"}, @end]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x68, 0x0, 0x920, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x8004080}, 0x4000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) socketpair(0x1e, 0x3, 0xfffffff8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000900)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x28, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r1, 0x0, "55a6bb", "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000400), 0x4, r2, 0x10, 0x327c989e9c6c0c43, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/cgroup\x00') r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x3}}, 0x20) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async, rerun: 32) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0xe5736019604da57a) (async, rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r3) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000806574683a69f19c90fec170366772653000"], 0x34}}, 0x0) 07:48:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x2, 0x0}}, 0xfffffdef) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400009a", @ANYRES16=r1, @ANYBLOB="050100000000ffdbdf250100000000000000014100000018001700000001000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r4, 0x1c, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast1, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"9e494e8300"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x115) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) timerfd_create(0x8, 0x40000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000940), 0x30001, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x42c, 0x3f3, 0x2, 0x70bd2b, 0x25dfdbfd, {0x5, 0x2, 0x34, [0xfffffffc, 0x882, 0x80, 0xeb33, 0x6, 0x80000000, 0x8, 0xb9, 0x2, 0x5, 0x1ff, 0x9d, 0x6, 0x20000000, 0x6, 0x20, 0x10001, 0x1ff, 0x3, 0x2, 0x38, 0xfffff000, 0xfffffe00, 0x80000000, 0xff, 0x6, 0x1, 0xfffffffd, 0xe3, 0x2, 0x0, 0x1, 0x1, 0x3, 0xfffffffe, 0x4, 0x7, 0xfffffffe, 0x9, 0xff21, 0x81, 0x4808, 0xc4d9, 0x6, 0x0, 0x2, 0x1f, 0x2, 0x1, 0xb044, 0x6, 0x5, 0x9a8, 0x4, 0xffff, 0x5, 0x8, 0xfffffff9, 0x3, 0x2, 0x80000001, 0x9, 0x3, 0x2], [0x0, 0x1, 0x4, 0x9, 0xffff, 0x3, 0x3ff, 0x3, 0x6, 0x3a4, 0xff, 0x2, 0x20, 0x7fffffff, 0x8, 0x7ff, 0x6, 0x0, 0x1, 0x3187, 0x6, 0x580b, 0x10001, 0x4, 0xfffff94e, 0x6, 0x10000, 0xf5fd, 0x8, 0xfffffffb, 0x13fed8c, 0x6a2ff2bc, 0x9, 0x2, 0x9d, 0x5, 0xfffff800, 0x0, 0x5, 0x100, 0x10001, 0x1780000, 0x6, 0xfe, 0x5, 0x9, 0xbc, 0x8a59, 0x6, 0x7, 0x1f, 0x1ff, 0x8, 0x9, 0x9, 0xfffffff9, 0x212, 0x1f814104, 0x8, 0x9, 0x5a1, 0x1, 0x55b], [0x40, 0x3b, 0x400, 0xffffff7f, 0x6314, 0x67, 0x200, 0x20, 0x3, 0x1, 0x8000, 0x401, 0x8, 0x1ff, 0x7fffffff, 0x605, 0x8, 0x1, 0x800, 0x1, 0x4, 0x7, 0x3, 0xa78, 0x80000000, 0x9, 0x2, 0x0, 0x3, 0x5, 0x20, 0x3a1, 0x5, 0xfe000, 0x0, 0x81, 0x0, 0x100, 0x401, 0x34ea, 0x1, 0x9, 0x8, 0x1, 0x7, 0x5, 0x7, 0x9, 0x9, 0x5, 0x9, 0x1ae, 0x8000, 0x3, 0x8, 0xb786, 0x9, 0x2bd8d9f1, 0x0, 0x1, 0x7fff, 0x0, 0x80, 0xfffffffd], [0x1, 0x7f, 0x10001, 0x2, 0x81, 0x5, 0x3, 0x4b, 0x80000000, 0xffffffff, 0x6, 0xfffffff9, 0x9, 0xd584, 0x9, 0x5, 0x0, 0x1000, 0xb44, 0x7219, 0x1000, 0x6, 0x3, 0x7, 0x401, 0x8, 0x1, 0x7fffffff, 0x3, 0xfffffffb, 0x81, 0x80000001, 0x9, 0xffffffff, 0x5, 0x9, 0x3, 0xd8f, 0x23225a76, 0x7, 0x4ee, 0x6, 0x4, 0x4c, 0x3, 0x80000000, 0x3, 0x0, 0x3, 0x100, 0x8c88, 0x10000, 0x4, 0x1000, 0x0, 0x4, 0xa1d, 0x4, 0x80000001, 0x0, 0x8, 0x2, 0x7fffffff, 0x6ab], 0xa, ['\x00', '\x00', 'syztnl0\x00']}, ["", "", "", "", ""]}, 0x42c}, 0x1, 0x0, 0x0, 0x810}, 0x20004811) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'syztnl0\x00', r3, 0x1, 0x40, 0x4, 0x401, {{0x17, 0x4, 0x0, 0x1a, 0x5c, 0x66, 0x0, 0x1, 0x4, 0x0, @loopback, @remote, {[@end, @timestamp_prespec={0x44, 0x24, 0xba, 0x3, 0x7, [{@loopback, 0x401}, {@loopback, 0x937}, {@multicast1, 0x1}, {@loopback, 0x401}]}, @noop, @lsrr={0x83, 0x17, 0x8, [@dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty]}, @generic={0x88, 0xa, "59bcee06b63b2b60"}, @end]}}}}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x68, 0x0, 0x920, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x8004080}, 0x4000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) socketpair(0x1e, 0x3, 0xfffffff8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000900)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x28, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000940), 0x30001, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_ADD_RULE(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x42c, 0x3f3, 0x2, 0x70bd2b, 0x25dfdbfd, {0x5, 0x2, 0x34, [0xfffffffc, 0x882, 0x80, 0xeb33, 0x6, 0x80000000, 0x8, 0xb9, 0x2, 0x5, 0x1ff, 0x9d, 0x6, 0x20000000, 0x6, 0x20, 0x10001, 0x1ff, 0x3, 0x2, 0x38, 0xfffff000, 0xfffffe00, 0x80000000, 0xff, 0x6, 0x1, 0xfffffffd, 0xe3, 0x2, 0x0, 0x1, 0x1, 0x3, 0xfffffffe, 0x4, 0x7, 0xfffffffe, 0x9, 0xff21, 0x81, 0x4808, 0xc4d9, 0x6, 0x0, 0x2, 0x1f, 0x2, 0x1, 0xb044, 0x6, 0x5, 0x9a8, 0x4, 0xffff, 0x5, 0x8, 0xfffffff9, 0x3, 0x2, 0x80000001, 0x9, 0x3, 0x2], [0x0, 0x1, 0x4, 0x9, 0xffff, 0x3, 0x3ff, 0x3, 0x6, 0x3a4, 0xff, 0x2, 0x20, 0x7fffffff, 0x8, 0x7ff, 0x6, 0x0, 0x1, 0x3187, 0x6, 0x580b, 0x10001, 0x4, 0xfffff94e, 0x6, 0x10000, 0xf5fd, 0x8, 0xfffffffb, 0x13fed8c, 0x6a2ff2bc, 0x9, 0x2, 0x9d, 0x5, 0xfffff800, 0x0, 0x5, 0x100, 0x10001, 0x1780000, 0x6, 0xfe, 0x5, 0x9, 0xbc, 0x8a59, 0x6, 0x7, 0x1f, 0x1ff, 0x8, 0x9, 0x9, 0xfffffff9, 0x212, 0x1f814104, 0x8, 0x9, 0x5a1, 0x1, 0x55b], [0x40, 0x3b, 0x400, 0xffffff7f, 0x6314, 0x67, 0x200, 0x20, 0x3, 0x1, 0x8000, 0x401, 0x8, 0x1ff, 0x7fffffff, 0x605, 0x8, 0x1, 0x800, 0x1, 0x4, 0x7, 0x3, 0xa78, 0x80000000, 0x9, 0x2, 0x0, 0x3, 0x5, 0x20, 0x3a1, 0x5, 0xfe000, 0x0, 0x81, 0x0, 0x100, 0x401, 0x34ea, 0x1, 0x9, 0x8, 0x1, 0x7, 0x5, 0x7, 0x9, 0x9, 0x5, 0x9, 0x1ae, 0x8000, 0x3, 0x8, 0xb786, 0x9, 0x2bd8d9f1, 0x0, 0x1, 0x7fff, 0x0, 0x80, 0xfffffffd], [0x1, 0x7f, 0x10001, 0x2, 0x81, 0x5, 0x3, 0x4b, 0x80000000, 0xffffffff, 0x6, 0xfffffff9, 0x9, 0xd584, 0x9, 0x5, 0x0, 0x1000, 0xb44, 0x7219, 0x1000, 0x6, 0x3, 0x7, 0x401, 0x8, 0x1, 0x7fffffff, 0x3, 0xfffffffb, 0x81, 0x80000001, 0x9, 0xffffffff, 0x5, 0x9, 0x3, 0xd8f, 0x23225a76, 0x7, 0x4ee, 0x6, 0x4, 0x4c, 0x3, 0x80000000, 0x3, 0x0, 0x3, 0x100, 0x8c88, 0x10000, 0x4, 0x1000, 0x0, 0x4, 0xa1d, 0x4, 0x80000001, 0x0, 0x8, 0x2, 0x7fffffff, 0x6ab], 0xa, ['\x00', '\x00', 'syztnl0\x00']}, ["", "", "", "", ""]}, 0x42c}, 0x1, 0x0, 0x0, 0x810}, 0x20004811) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'syztnl0\x00', r3, 0x1, 0x40, 0x4, 0x401, {{0x17, 0x4, 0x0, 0x1a, 0x5c, 0x66, 0x0, 0x1, 0x4, 0x0, @loopback, @remote, {[@end, @timestamp_prespec={0x44, 0x24, 0xba, 0x3, 0x7, [{@loopback, 0x401}, {@loopback, 0x937}, {@multicast1, 0x1}, {@loopback, 0x401}]}, @noop, @lsrr={0x83, 0x17, 0x8, [@dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty]}, @generic={0x88, 0xa, "59bcee06b63b2b60"}, @end]}}}}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x68, 0x0, 0x920, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x8004080}, 0x4000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) socketpair(0x1e, 0x3, 0xfffffff8, &(0x7f00000001c0)) (async) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000900)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x28, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) 07:48:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x8}}, 0xfffffdef) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400009a", @ANYRES16=r1, @ANYBLOB="050100000000ffdbdf250100000000000000014100000018001700000001000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) timerfd_create(0x8, 0x40000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) timerfd_create(0x8, 0x40000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r4, 0x1c, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast1, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"9e494e8300"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x115) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) timerfd_create(0x8, 0x40000) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async, rerun: 32) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000940), 0x30001, 0x0) (rerun: 32) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x42c, 0x3f3, 0x2, 0x70bd2b, 0x25dfdbfd, {0x5, 0x2, 0x34, [0xfffffffc, 0x882, 0x80, 0xeb33, 0x6, 0x80000000, 0x8, 0xb9, 0x2, 0x5, 0x1ff, 0x9d, 0x6, 0x20000000, 0x6, 0x20, 0x10001, 0x1ff, 0x3, 0x2, 0x38, 0xfffff000, 0xfffffe00, 0x80000000, 0xff, 0x6, 0x1, 0xfffffffd, 0xe3, 0x2, 0x0, 0x1, 0x1, 0x3, 0xfffffffe, 0x4, 0x7, 0xfffffffe, 0x9, 0xff21, 0x81, 0x4808, 0xc4d9, 0x6, 0x0, 0x2, 0x1f, 0x2, 0x1, 0xb044, 0x6, 0x5, 0x9a8, 0x4, 0xffff, 0x5, 0x8, 0xfffffff9, 0x3, 0x2, 0x80000001, 0x9, 0x3, 0x2], [0x0, 0x1, 0x4, 0x9, 0xffff, 0x3, 0x3ff, 0x3, 0x6, 0x3a4, 0xff, 0x2, 0x20, 0x7fffffff, 0x8, 0x7ff, 0x6, 0x0, 0x1, 0x3187, 0x6, 0x580b, 0x10001, 0x4, 0xfffff94e, 0x6, 0x10000, 0xf5fd, 0x8, 0xfffffffb, 0x13fed8c, 0x6a2ff2bc, 0x9, 0x2, 0x9d, 0x5, 0xfffff800, 0x0, 0x5, 0x100, 0x10001, 0x1780000, 0x6, 0xfe, 0x5, 0x9, 0xbc, 0x8a59, 0x6, 0x7, 0x1f, 0x1ff, 0x8, 0x9, 0x9, 0xfffffff9, 0x212, 0x1f814104, 0x8, 0x9, 0x5a1, 0x1, 0x55b], [0x40, 0x3b, 0x400, 0xffffff7f, 0x6314, 0x67, 0x200, 0x20, 0x3, 0x1, 0x8000, 0x401, 0x8, 0x1ff, 0x7fffffff, 0x605, 0x8, 0x1, 0x800, 0x1, 0x4, 0x7, 0x3, 0xa78, 0x80000000, 0x9, 0x2, 0x0, 0x3, 0x5, 0x20, 0x3a1, 0x5, 0xfe000, 0x0, 0x81, 0x0, 0x100, 0x401, 0x34ea, 0x1, 0x9, 0x8, 0x1, 0x7, 0x5, 0x7, 0x9, 0x9, 0x5, 0x9, 0x1ae, 0x8000, 0x3, 0x8, 0xb786, 0x9, 0x2bd8d9f1, 0x0, 0x1, 0x7fff, 0x0, 0x80, 0xfffffffd], [0x1, 0x7f, 0x10001, 0x2, 0x81, 0x5, 0x3, 0x4b, 0x80000000, 0xffffffff, 0x6, 0xfffffff9, 0x9, 0xd584, 0x9, 0x5, 0x0, 0x1000, 0xb44, 0x7219, 0x1000, 0x6, 0x3, 0x7, 0x401, 0x8, 0x1, 0x7fffffff, 0x3, 0xfffffffb, 0x81, 0x80000001, 0x9, 0xffffffff, 0x5, 0x9, 0x3, 0xd8f, 0x23225a76, 0x7, 0x4ee, 0x6, 0x4, 0x4c, 0x3, 0x80000000, 0x3, 0x0, 0x3, 0x100, 0x8c88, 0x10000, 0x4, 0x1000, 0x0, 0x4, 0xa1d, 0x4, 0x80000001, 0x0, 0x8, 0x2, 0x7fffffff, 0x6ab], 0xa, ['\x00', '\x00', 'syztnl0\x00']}, ["", "", "", "", ""]}, 0x42c}, 0x1, 0x0, 0x0, 0x810}, 0x20004811) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'syztnl0\x00', r3, 0x1, 0x40, 0x4, 0x401, {{0x17, 0x4, 0x0, 0x1a, 0x5c, 0x66, 0x0, 0x1, 0x4, 0x0, @loopback, @remote, {[@end, @timestamp_prespec={0x44, 0x24, 0xba, 0x3, 0x7, [{@loopback, 0x401}, {@loopback, 0x937}, {@multicast1, 0x1}, {@loopback, 0x401}]}, @noop, @lsrr={0x83, 0x17, 0x8, [@dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty]}, @generic={0x88, 0xa, "59bcee06b63b2b60"}, @end]}}}}}) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (rerun: 32) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x68, 0x0, 0x920, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0x8004080}, 0x4000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) socketpair(0x1e, 0x3, 0xfffffff8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000900)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x28, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="3400009a", @ANYRES16=r1, @ANYBLOB="050100000000ffdbdf250100000000000000014100000018001700000001000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 64) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r4, 0x1c, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast1, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"9e494e8300"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x115) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="51f75092d77b00f8bd719bf20dfc8e3d4938f0efb5fb5e50d322", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x246ee55eb9c61b81, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"c588e48a243c2bb15d0f08b54b51c0b9", 0x0, 0x0, {0x8, 0xb90}, {0x3, 0xff}, 0x800, [0x9, 0xfffffffffffffe00, 0xfffffffffffffff7, 0x10001, 0x7fffffffffffffff, 0x8000000000000001, 0x81, 0x7fff, 0x86c, 0x0, 0x8, 0x9, 0xfffffffffffff342, 0x9, 0x7b, 0xcb]}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfff, 0x8, {"41322e260ccc72dd775b87c89331273b"}, 0x7, 0x2, 0xfff}}}, 0xa0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000100)={"6f47a9568e0755a7256ef832beccbdc8", 0x0, r1, {0xe65, 0x2}, {0x1, 0x8}, 0x0, [0x5, 0x9, 0x1, 0x5, 0x3, 0x9, 0x200000000000000, 0x200, 0x8, 0x80, 0x7, 0x9, 0x5591, 0x200, 0xe7, 0x3]}) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, r2, 0x10, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x20c}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x9, 0x4, {"220ebbf125e640321419050af195db4b"}, 0x1, 0x5, 0x2}}}, 0x90) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x4e24, 0x400, @mcast1, 0x6}}}, 0xa0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x246ee55eb9c61b81, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"c588e48a243c2bb15d0f08b54b51c0b9", 0x0, 0x0, {0x8, 0xb90}, {0x3, 0xff}, 0x800, [0x9, 0xfffffffffffffe00, 0xfffffffffffffff7, 0x10001, 0x7fffffffffffffff, 0x8000000000000001, 0x81, 0x7fff, 0x86c, 0x0, 0x8, 0x9, 0xfffffffffffff342, 0x9, 0x7b, 0xcb]}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfff, 0x8, {"41322e260ccc72dd775b87c89331273b"}, 0x7, 0x2, 0xfff}}}, 0xa0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000100)={"6f47a9568e0755a7256ef832beccbdc8", 0x0, r1, {0xe65, 0x2}, {0x1, 0x8}, 0x0, [0x5, 0x9, 0x1, 0x5, 0x3, 0x9, 0x200000000000000, 0x200, 0x8, 0x80, 0x7, 0x9, 0x5591, 0x200, 0xe7, 0x3]}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x246ee55eb9c61b81, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"c588e48a243c2bb15d0f08b54b51c0b9", 0x0, 0x0, {0x8, 0xb90}, {0x3, 0xff}, 0x800, [0x9, 0xfffffffffffffe00, 0xfffffffffffffff7, 0x10001, 0x7fffffffffffffff, 0x8000000000000001, 0x81, 0x7fff, 0x86c, 0x0, 0x8, 0x9, 0xfffffffffffff342, 0x9, 0x7b, 0xcb]}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfff, 0x8, {"41322e260ccc72dd775b87c89331273b"}, 0x7, 0x2, 0xfff}}}, 0xa0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000100)={"6f47a9568e0755a7256ef832beccbdc8", 0x0, r1, {0xe65, 0x2}, {0x1, 0x8}, 0x0, [0x5, 0x9, 0x1, 0x5, 0x3, 0x9, 0x200000000000000, 0x200, 0x8, 0x80, 0x7, 0x9, 0x5591, 0x200, 0xe7, 0x3]}) (async) 07:48:41 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x4, 0x0}}, 0xfffffdef) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="51f75092d77b00f8bd719bf20dfc8e3d4938f0efb5fb5e50d322", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, r2, 0x10, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x20c}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x9, 0x4, {"220ebbf125e640321419050af195db4b"}, 0x1, 0x5, 0x2}}}, 0x90) 07:48:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0xc}}, 0xfffffdef) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x4e24, 0x400, @mcast1, 0x6}}}, 0xa0) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="51f75092d77b00f8bd719bf20dfc8e3d4938f0efb5fb5e50d322", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, r2, 0x10, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, r2, 0x10, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x20c}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x20c}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x9, 0x4, {"220ebbf125e640321419050af195db4b"}, 0x1, 0x5, 0x2}}}, 0x90) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x4, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x4e24, 0x400, @mcast1, 0x6}}}, 0xa0) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "010100", "14acccdd88da63a0f59c6082858a36b47cceb0ca4181cdb9d4c85473cd0c358057cc6513c20551a6b92d87b055fcd76d04c41926744dfc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22d8c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9813c12d1ed775ef2f3f35221d25c4542ff58ef5782d68089f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef23082151e016cc900"}}, 0x110) 07:48:41 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x246ee55eb9c61b81, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"c588e48a243c2bb15d0f08b54b51c0b9", 0x0, 0x0, {0x8, 0xb90}, {0x3, 0xff}, 0x800, [0x9, 0xfffffffffffffe00, 0xfffffffffffffff7, 0x10001, 0x7fffffffffffffff, 0x8000000000000001, 0x81, 0x7fff, 0x86c, 0x0, 0x8, 0x9, 0xfffffffffffff342, 0x9, 0x7b, 0xcb]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"c588e48a243c2bb15d0f08b54b51c0b9", 0x0, 0x0, {0x8, 0xb90}, {0x3, 0xff}, 0x800, [0x9, 0xfffffffffffffe00, 0xfffffffffffffff7, 0x10001, 0x7fffffffffffffff, 0x8000000000000001, 0x81, 0x7fff, 0x86c, 0x0, 0x8, 0x9, 0xfffffffffffff342, 0x9, 0x7b, 0xcb]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfff, 0x8, {"41322e260ccc72dd775b87c89331273b"}, 0x7, 0x2, 0xfff}}}, 0xa0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000100)={"6f47a9568e0755a7256ef832beccbdc8", 0x0, r1, {0xe65, 0x2}, {0x1, 0x8}, 0x0, [0x5, 0x9, 0x1, 0x5, 0x3, 0x9, 0x200000000000000, 0x200, 0x8, 0x80, 0x7, 0x9, 0x5591, 0x200, 0xe7, 0x3]}) 07:48:41 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x161140, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffeae) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1053}}, 0x10) prctl$PR_GET_KEEPCAPS(0x7) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x4, @remote, 0x7}, {0xa, 0x4e21, 0x1c, @private1, 0xf2e}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00012dbd7000ffdbdf25080000000800090001000000060002000000000014002000fe88000000000000000000000000000105000d00010000000500070003000000050012007f00000008150c00040000000500e8ffdf000000050004000800008008000b0004000000"], 0x70}, 0x1, 0x0, 0x0, 0x40004}, 0x20000000) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000400000000000000000141000000180017200000000000009c9aa4d33a697036677265300017e3cb031c9977c92d46e27d82ba24a12fba8b6d03d3063afcb109aea4d331e7c4b2911c750e6931d79c709bbd2384a02fec663a9c5bb8178763b46c760a7967bb784fab6211adbc92208e2e7667b1ec26fc166596378b6ea29e4f4d5ebfcc23ee7420a329c705b6e2c4ca2a0f69e9773246ffba17bf868455181bc4c3985d2bfa15719779ff70adf1440699e0e58d012afa2783549ee52fb2eff9840ff1adf4de27c9e28e5728e435b59f88"], 0x34}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040001}, 0x4000002) [ 2296.741528][T23760] tipc: Enabling of bearer rejected, failed to enable media 07:48:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x5, 0x0}}, 0xfffffdef) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "010100", "14acccdd88da63a0f59c6082858a36b47cceb0ca4181cdb9d4c85473cd0c358057cc6513c20551a6b92d87b055fcd76d04c41926744dfc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22d8c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9813c12d1ed775ef2f3f35221d25c4542ff58ef5782d68089f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef23082151e016cc900"}}, 0x110) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x648, 0x3bd, "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", 0xca, 0x1, 0xe0, 0x1, 0x9, 0x5, 0x80, 0x1}, r3}}, 0x120) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x161140, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffeae) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1053}}, 0x10) (async) prctl$PR_GET_KEEPCAPS(0x7) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x4, @remote, 0x7}, {0xa, 0x4e21, 0x1c, @private1, 0xf2e}, 0xffffffffffffffff, 0x8}}, 0x48) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00012dbd7000ffdbdf25080000000800090001000000060002000000000014002000fe88000000000000000000000000000105000d00010000000500070003000000050012007f00000008150c00040000000500e8ffdf000000050004000800008008000b0004000000"], 0x70}, 0x1, 0x0, 0x0, 0x40004}, 0x20000000) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000400000000000000000141000000180017200000000000009c9aa4d33a697036677265300017e3cb031c9977c92d46e27d82ba24a12fba8b6d03d3063afcb109aea4d331e7c4b2911c750e6931d79c709bbd2384a02fec663a9c5bb8178763b46c760a7967bb784fab6211adbc92208e2e7667b1ec26fc166596378b6ea29e4f4d5ebfcc23ee7420a329c705b6e2c4ca2a0f69e9773246ffba17bf868455181bc4c3985d2bfa15719779ff70adf1440699e0e58d012afa2783549ee52fb2eff9840ff1adf4de27c9e28e5728e435b59f88"], 0x34}}, 0x0) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040001}, 0x4000002) 07:48:42 executing program 1: getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x648, 0x3bd, "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", 0xca, 0x1, 0xe0, 0x1, 0x9, 0x5, 0x80, 0x1}, r3}}, 0x120) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x161140, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffeae) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1053}}, 0x10) prctl$PR_GET_KEEPCAPS(0x7) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x4, @remote, 0x7}, {0xa, 0x4e21, 0x1c, @private1, 0xf2e}, 0xffffffffffffffff, 0x8}}, 0x48) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "010100", "14acccdd88da63a0f59c6082858a36b47cceb0ca4181cdb9d4c85473cd0c358057cc6513c20551a6b92d87b055fcd76d04c41926744dfc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22d8c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9813c12d1ed775ef2f3f35221d25c4542ff58ef5782d68089f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef23082151e016cc900"}}, 0x110) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x1c, r4, 0x20, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00012dbd7000ffdbdf25080000000800090001000000060002000000000014002000fe88000000000000000000000000000105000d00010000000500070003000000050012007f00000008150c00040000000500e8ffdf000000050004000800008008000b0004000000"], 0x70}, 0x1, 0x0, 0x0, 0x40004}, 0x20000000) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000400000000000000000141000000180017200000000000009c9aa4d33a697036677265300017e3cb031c9977c92d46e27d82ba24a12fba8b6d03d3063afcb109aea4d331e7c4b2911c750e6931d79c709bbd2384a02fec663a9c5bb8178763b46c760a7967bb784fab6211adbc92208e2e7667b1ec26fc166596378b6ea29e4f4d5ebfcc23ee7420a329c705b6e2c4ca2a0f69e9773246ffba17bf868455181bc4c3985d2bfa15719779ff70adf1440699e0e58d012afa2783549ee52fb2eff9840ff1adf4de27c9e28e5728e435b59f88"], 0x34}}, 0x0) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040001}, 0x4000002) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) read$qrtrtun(r0, &(0x7f0000000280)=""/131, 0x83) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB=',@\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fcdbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40041) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 2296.862531][T23768] tipc: Enabling of bearer rejected, failed to enable media 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x648, 0x3bd, "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", 0xca, 0x1, 0xe0, 0x1, 0x9, 0x5, 0x80, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x648, 0x3bd, "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", 0xca, 0x1, 0xe0, 0x1, 0x9, 0x5, 0x80, 0x1}, r3}}, 0x120) [ 2296.941584][T23794] tipc: Enabling of bearer rejected, failed to enable media 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) timerfd_create(0x5, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) read$qrtrtun(r0, &(0x7f0000000280)=""/131, 0x83) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB=',@\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fcdbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40041) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 64) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) (async, rerun: 32) socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 32) 07:48:42 executing program 5: r0 = socket(0x9, 0x4e64b883e41d1c3e, 0x10001) getsockopt$MRT6(r0, 0x29, 0xce, &(0x7f0000000200), &(0x7f0000000280)=0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socketpair(0x0, 0x80000, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_J1939_FILTER(r2, 0x6b, 0x1, &(0x7f0000000040)=[{0x1, 0x0, {0x0, 0x1, 0x3}, {0x2, 0x1, 0x4}, 0x0, 0xfe}], 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/irq', 0x10000, 0x59) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x3f, '#6o', "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"}}, 0x110) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'sit0\x00', &(0x7f00000000c0)={@dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, 0x20, 0x0, [{@local}, {@empty}]}}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="81f3348ace67c5be419be7fdb4f92c388e89d305f9f93eb4fbc19ec3f02b3cc2f6058358d0ba85107b9b03ea081f56f1b2138b0d948daf9f2f3a87bdc4128206ababcdb8b6d59354d00a2a1fa013efc1a0baef8786a2c761234148cf20f1", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socketpair(0xb, 0x4, 0x474b, &(0x7f0000000140)) ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000180)=0x1) 07:48:42 executing program 1: getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) 07:48:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x6, 0x0}}, 0xfffffdef) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'sit0\x00', &(0x7f00000000c0)={@dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, 0x20, 0x0, [{@local}, {@empty}]}}) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="81f3348ace67c5be419be7fdb4f92c388e89d305f9f93eb4fbc19ec3f02b3cc2f6058358d0ba85107b9b03ea081f56f1b2138b0d948daf9f2f3a87bdc4128206ababcdb8b6d59354d00a2a1fa013efc1a0baef8786a2c761234148cf20f1", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) socketpair(0xb, 0x4, 0x474b, &(0x7f0000000140)) (async) ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000180)=0x1) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) timerfd_create(0x5, 0x800) (async) timerfd_create(0x5, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 5: r0 = socket(0x9, 0x4e64b883e41d1c3e, 0x10001) getsockopt$MRT6(r0, 0x29, 0xce, &(0x7f0000000200), &(0x7f0000000280)=0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socketpair(0x0, 0x80000, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_J1939_FILTER(r2, 0x6b, 0x1, &(0x7f0000000040)=[{0x1, 0x0, {0x0, 0x1, 0x3}, {0x2, 0x1, 0x4}, 0x0, 0xfe}], 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/irq', 0x10000, 0x59) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x3f, '#6o', "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"}}, 0x110) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) read$qrtrtun(r0, &(0x7f0000000280)=""/131, 0x83) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB=',@\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fcdbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40041) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) timerfd_create(0x5, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'sit0\x00', &(0x7f00000000c0)={@dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, 0x20, 0x0, [{@local}, {@empty}]}}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="81f3348ace67c5be419be7fdb4f92c388e89d305f9f93eb4fbc19ec3f02b3cc2f6058358d0ba85107b9b03ea081f56f1b2138b0d948daf9f2f3a87bdc4128206ababcdb8b6d59354d00a2a1fa013efc1a0baef8786a2c761234148cf20f1", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socketpair(0xb, 0x4, 0x474b, &(0x7f0000000140)) ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000180)=0x1) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000100)={'sit0\x00', &(0x7f00000000c0)={@dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, 0x20, 0x0, [{@local}, {@empty}]}}) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="81f3348ace67c5be419be7fdb4f92c388e89d305f9f93eb4fbc19ec3f02b3cc2f6058358d0ba85107b9b03ea081f56f1b2138b0d948daf9f2f3a87bdc4128206ababcdb8b6d59354d00a2a1fa013efc1a0baef8786a2c761234148cf20f1", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) socketpair(0xb, 0x4, 0x474b, &(0x7f0000000140)) (async) ioctl$TFD_IOC_SET_TICKS(0xffffffffffffffff, 0x40085400, &(0x7f0000000180)=0x1) (async) 07:48:42 executing program 5: r0 = socket(0x9, 0x4e64b883e41d1c3e, 0x10001) getsockopt$MRT6(r0, 0x29, 0xce, &(0x7f0000000200), &(0x7f0000000280)=0x4) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) socketpair(0x0, 0x80000, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_J1939_FILTER(r2, 0x6b, 0x1, &(0x7f0000000040)=[{0x1, 0x0, {0x0, 0x1, 0x3}, {0x2, 0x1, 0x4}, 0x0, 0xfe}], 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async, rerun: 32) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/irq', 0x10000, 0x59) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x3f, '#6o', "378bf796eae44b20188b739a9f184c477967f92651ae9f55f9c2d896456f44025fcabd52357017f0134c3b5e5ce16fdf1f6181e113215955582e8997e1d6436dd03bd5bee86cbb3f1ed9ce67832b9053e80cc8c1b2652144bc0250fc53ae80cadcbcd94f44cb6e15911eb682387721ee6d5c59de35f0d6abd81e0a392bffdf43dd2bd0330d2569f9d598f97a45435ffcd403cb8b48db442c6876c2be7089dbd1a1547b42537d8e5f8033ef4078525ee42182cfff8f281f4fcad3851b83bfb9b141c41640df3e0e29ca93866b8ace43cfd7e6174484ab9d91fcec1a07886e735d98cf962d3ae3aff63ca92219eb37e970968a8a14f2529f54bb79559296326236"}}, 0x110) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101400, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e24, 0x2, @empty, 0x7}}}, 0x38) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x10c2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@local, @multicast1, 0x9, 0xe}}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x2, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0xffffffffffffffff}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='t\x00\x00\x00\vm', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@local, @multicast1, 0x9, 0xe}}) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x2, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0xffffffffffffffff}}}, 0xa0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101400, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e24, 0x2, @empty, 0x7}}}, 0x38) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x10c2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101400, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e24, 0x2, @empty, 0x7}}}, 0x38) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x10c2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='t\x00\x00\x00\vm', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='t\x00\x00\x00\vm', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) 07:48:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0xffffffffffffffde, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x1, "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", 0x6, 0x1, 0xf7, 0x2, 0x7, 0x6, 0x6, 0x1}}}, 0x128) 07:48:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x8, 0x0}}, 0xfffffdef) 07:48:42 executing program 1: getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) 07:48:42 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@local, @multicast1, 0x9, 0xe}}) (async, rerun: 64) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x2, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0xffffffffffffffff}}}, 0xa0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101400, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e24, 0x2, @empty, 0x7}}}, 0x38) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x10c2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x101400, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e24, 0x2, @empty, 0x7}}}, 0x38) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x10c2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='t\x00\x00\x00\vm', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0xffffffffffffffde, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x1, "90df9b1193fd9cffc3cd20edbd392b2559ac6bdff4a21bf9dbb2e259219eb7699b7b65864e815f2839dbc90ced26847bfe848294d5b8597d30b54af00d6838c0ac8250b0dcbd86a70abba0e53cb42f313034166b1a7b21ca509bb46e2ec7d74d65cc2c6f55397d99d11af31814309664f1d3a6af30ac4edd6e0acd5f06751966e03791cc4e38ef723ba6bc0a3979f23870e55e73d6406b43a04851c122aa6258a1cb1a7a40f0b68006ef27faf0b1210448e367da2240824a1fe39b3c5d26b293111e393e7fa9cb2a0fbc99cd7da1636acd958febd38d6074568113af7c7f3bb274ee600b0e15c454a99597357b4cbfee57096e0f23e15c9825d6d466e04c231f", 0x6, 0x1, 0xf7, 0x2, 0x7, 0x6, 0x6, 0x1}}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0xffffffffffffffde, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x1, "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", 0x6, 0x1, 0xf7, 0x2, 0x7, 0x6, 0x6, 0x1}}}, 0x128) (async) 07:48:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0xffffffffffffffde, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x1, "90df9b1193fd9cffc3cd20edbd392b2559ac6bdff4a21bf9dbb2e259219eb7699b7b65864e815f2839dbc90ced26847bfe848294d5b8597d30b54af00d6838c0ac8250b0dcbd86a70abba0e53cb42f313034166b1a7b21ca509bb46e2ec7d74d65cc2c6f55397d99d11af31814309664f1d3a6af30ac4edd6e0acd5f06751966e03791cc4e38ef723ba6bc0a3979f23870e55e73d6406b43a04851c122aa6258a1cb1a7a40f0b68006ef27faf0b1210448e367da2240824a1fe39b3c5d26b293111e393e7fa9cb2a0fbc99cd7da1636acd958febd38d6074568113af7c7f3bb274ee600b0e15c454a99597357b4cbfee57096e0f23e15c9825d6d466e04c231f", 0x6, 0x1, 0xf7, 0x2, 0x7, 0x6, 0x6, 0x1}}}, 0x128) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x13f}}, 0x20) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x13f}}, 0x20) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x492d03, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/bus/gpio', 0x5c1, 0x51) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x10, r4, 0xfbd) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0x3, 0x3, 0x1, 0x1850, r1, 0x0, '\x00', r3, r0, 0x0, 0x5, 0x3}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r7}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'gretap0\x00', r7, 0x83, 0x8752, 0x0, 0x9, {{0x14, 0x4, 0x3, 0x9, 0x50, 0x68, 0x0, 0x5, 0x29, 0x0, @private=0xa010102, @multicast1, {[@lsrr={0x83, 0x7, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0xb3, [@empty, @loopback, @multicast2, @multicast2, @local, @empty, @local]}, @lsrr={0x83, 0x13, 0x72, [@loopback, @empty, @local, @multicast1]}, @end]}}}}}) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x106, 0x1}}, 0x20) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xc, 0x0}}, 0xfffffdef) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x13f}}, 0x20) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x215, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'gretap0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x48011}, 0x5) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x492d03, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/bus/gpio', 0x5c1, 0x51) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x10, r4, 0xfbd) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0x3, 0x3, 0x1, 0x1850, r1, 0x0, '\x00', r3, r0, 0x0, 0x5, 0x3}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r7}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'gretap0\x00', r7, 0x83, 0x8752, 0x0, 0x9, {{0x14, 0x4, 0x3, 0x9, 0x50, 0x68, 0x0, 0x5, 0x29, 0x0, @private=0xa010102, @multicast1, {[@lsrr={0x83, 0x7, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0xb3, [@empty, @loopback, @multicast2, @multicast2, @local, @empty, @local]}, @lsrr={0x83, 0x13, 0x72, [@loopback, @empty, @local, @multicast1]}, @end]}}}}}) (async) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x106, 0x1}}, 0x20) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r5}}, 0x18) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/drm', 0x6001, 0x100) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x508, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x811) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x100000000000, 0x0}}, 0x20) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x492d03, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/bus/gpio', 0x5c1, 0x51) mmap$qrtrtun(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x10, r4, 0xfbd) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0x3, 0x3, 0x1, 0x1850, r1, 0x0, '\x00', r3, r0, 0x0, 0x5, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0x3, 0x3, 0x1, 0x1850, r1, 0x0, '\x00', r3, r0, 0x0, 0x5, 0x3}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r7}, 0x48) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'gretap0\x00', r7, 0x83, 0x8752, 0x0, 0x9, {{0x14, 0x4, 0x3, 0x9, 0x50, 0x68, 0x0, 0x5, 0x29, 0x0, @private=0xa010102, @multicast1, {[@lsrr={0x83, 0x7, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x1f, 0xb3, [@empty, @loopback, @multicast2, @multicast2, @local, @empty, @local]}, @lsrr={0x83, 0x13, 0x72, [@loopback, @empty, @local, @multicast1]}, @end]}}}}}) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x106, 0x1}}, 0x20) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x215, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'gretap0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x48011}, 0x5) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async, rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r5}}, 0x18) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (rerun: 64) [ 2297.680072][T23935] tipc: Enabling of bearer rejected, already enabled [ 2297.743721][T23952] tipc: Enabling of bearer rejected, already enabled 07:48:42 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/drm', 0x6001, 0x100) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x508, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x811) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x4e24, 0x8, @mcast2, 0x1}}}, 0x38) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x20, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x100000000000, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x100000000000, 0x0}}, 0x20) 07:48:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x215, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'gretap0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x48011}, 0x5) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r3, 0x215, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'gretap0\x00'}}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x48011}, 0x5) (async) 07:48:42 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r5}}, 0x18) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (rerun: 32) 07:48:42 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x10, 0x0}}, 0xfffffdef) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/drm', 0x6001, 0x100) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x508, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x811) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x103000, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x100000000000, 0x0}}, 0x20) 07:48:43 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x430080, 0x408) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/port100', 0x10200, 0x82) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/rtsx_usb', 0x97fc80, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\b\x00', @ANYRES32=0x0, @ANYBLOB="0080070000001e7b0000000440ae004000660000030490780a0101000a0101018307c1ac1414aa01440c2db1ffffffff00000009830f2bac1414aaac14143aac1414388307ac7f0000010100"]}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', r3, 0x700, 0x20, 0x200, 0x2, {{0x21, 0x4, 0x3, 0x4, 0x84, 0x67, 0x0, 0x40, 0x29, 0x0, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x86, 0xf, "e0c6838b3cb292afa8c6b9c98e"}, @timestamp_prespec={0x44, 0x2c, 0x27, 0x3, 0x1, [{@rand_addr=0x64010101, 0xdf8}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1f}, {@broadcast, 0x6}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x7ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4db}]}, @rr={0x7, 0x23, 0xd6, [@multicast1, @rand_addr=0x64010100, @rand_addr=0x64010101, @local, @local, @remote, @multicast2, @multicast2]}, @timestamp={0x44, 0x10, 0x19, 0x0, 0x3, [0xfffff5f3, 0xfffffffd, 0x9]}]}}}}}) r4 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_PIM(r4, 0x29, 0xcf, &(0x7f00000000c0)=0x2, 0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "efa87d", "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c327d7", "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"}}, 0x110) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x90503, 0x0) setsockopt$MRT6_PIM(r6, 0x29, 0xcf, &(0x7f0000000140)=0x2, 0x4) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x4e24, 0x8, @mcast2, 0x1}}}, 0x38) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x20, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x4e24, 0x8, @mcast2, 0x1}}}, 0x38) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x20, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000000)=[{0x2, 0x2, {0x2, 0x0, 0x4}, {0x0, 0x0, 0x4}, 0x2, 0x1}, {0x2, 0x2, {0x1, 0x1, 0x1}, {0x0, 0xff}, 0xff, 0xfd}, {0x2, 0x1, {0x0, 0x0, 0x3}, {0x2, 0xf0}, 0xfe, 0xfe}, {0x0, 0x3, {0x1, 0x1}, {0x1, 0x1, 0x2}, 0x1}, {0x2, 0x2, {0x1, 0xf0, 0x4}, {0x2, 0xff}, 0xff}, {0x0, 0x2, {0x0, 0xf0, 0x3}, {0x2, 0x1, 0x1}, 0xfd, 0xfe}], 0xc0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x1560, @mcast2, 0x2}}}, 0xa0) [ 2297.826392][T23964] tipc: Enabling of bearer rejected, already enabled [ 2297.847809][T23976] tipc: Enabling of bearer rejected, already enabled 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x0, {0xa, 0x4e24, 0x8, @mcast2, 0x1}}}, 0x38) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x20, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x80) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x28, 0x3f7, 0x20, 0x70bd2b, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x430080, 0x408) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/port100', 0x10200, 0x82) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/rtsx_usb', 0x97fc80, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\b\x00', @ANYRES32=0x0, @ANYBLOB="0080070000001e7b0000000440ae004000660000030490780a0101000a0101018307c1ac1414aa01440c2db1ffffffff00000009830f2bac1414aaac14143aac1414388307ac7f0000010100"]}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', r3, 0x700, 0x20, 0x200, 0x2, {{0x21, 0x4, 0x3, 0x4, 0x84, 0x67, 0x0, 0x40, 0x29, 0x0, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x86, 0xf, "e0c6838b3cb292afa8c6b9c98e"}, @timestamp_prespec={0x44, 0x2c, 0x27, 0x3, 0x1, [{@rand_addr=0x64010101, 0xdf8}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1f}, {@broadcast, 0x6}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x7ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4db}]}, @rr={0x7, 0x23, 0xd6, [@multicast1, @rand_addr=0x64010100, @rand_addr=0x64010101, @local, @local, @remote, @multicast2, @multicast2]}, @timestamp={0x44, 0x10, 0x19, 0x0, 0x3, [0xfffff5f3, 0xfffffffd, 0x9]}]}}}}}) r4 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_PIM(r4, 0x29, 0xcf, &(0x7f00000000c0)=0x2, 0x4) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "efa87d", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c327d7", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x90503, 0x0) setsockopt$MRT6_PIM(r6, 0x29, 0xcf, &(0x7f0000000140)=0x2, 0x4) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r3, 0x3, {0x0, 0xff, 0x1}, 0xff}, 0x18) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x1560, @mcast2, 0x2}}}, 0xa0) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r3, 0x3, {0x0, 0xff, 0x1}, 0xff}, 0x18) [ 2297.923096][T23998] tipc: Enabling of bearer rejected, already enabled [ 2297.955568][T24009] tipc: Enabling of bearer rejected, already enabled 07:48:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x204, 0x0}}, 0xfffffdef) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x430080, 0x408) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/port100', 0x10200, 0x82) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/rtsx_usb', 0x97fc80, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\b\x00', @ANYRES32=0x0, @ANYBLOB="0080070000001e7b0000000440ae004000660000030490780a0101000a0101018307c1ac1414aa01440c2db1ffffffff00000009830f2bac1414aaac14143aac1414388307ac7f0000010100"]}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', r3, 0x700, 0x20, 0x200, 0x2, {{0x21, 0x4, 0x3, 0x4, 0x84, 0x67, 0x0, 0x40, 0x29, 0x0, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x86, 0xf, "e0c6838b3cb292afa8c6b9c98e"}, @timestamp_prespec={0x44, 0x2c, 0x27, 0x3, 0x1, [{@rand_addr=0x64010101, 0xdf8}, {@dev={0xac, 0x14, 0x14, 0x23}, 0x1f}, {@broadcast, 0x6}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x7ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4db}]}, @rr={0x7, 0x23, 0xd6, [@multicast1, @rand_addr=0x64010100, @rand_addr=0x64010101, @local, @local, @remote, @multicast2, @multicast2]}, @timestamp={0x44, 0x10, 0x19, 0x0, 0x3, [0xfffff5f3, 0xfffffffd, 0x9]}]}}}}}) r4 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_PIM(r4, 0x29, 0xcf, &(0x7f00000000c0)=0x2, 0x4) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "efa87d", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "c327d7", "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"}}, 0x110) (async) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x90503, 0x0) setsockopt$MRT6_PIM(r6, 0x29, 0xcf, &(0x7f0000000140)=0x2, 0x4) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3}, 0x48) (async, rerun: 32) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r3, 0x3, {0x0, 0xff, 0x1}, 0xff}, 0x18) (rerun: 32) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x1560, @mcast2, 0x2}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x1560, @mcast2, 0x2}}}, 0xa0) (async) 07:48:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000000)=[{0x2, 0x2, {0x2, 0x0, 0x4}, {0x0, 0x0, 0x4}, 0x2, 0x1}, {0x2, 0x2, {0x1, 0x1, 0x1}, {0x0, 0xff}, 0xff, 0xfd}, {0x2, 0x1, {0x0, 0x0, 0x3}, {0x2, 0xf0}, 0xfe, 0xfe}, {0x0, 0x3, {0x1, 0x1}, {0x1, 0x1, 0x2}, 0x1}, {0x2, 0x2, {0x1, 0xf0, 0x4}, {0x2, 0xff}, 0xff}, {0x0, 0x2, {0x0, 0xf0, 0x3}, {0x2, 0x1, 0x1}, 0xfd, 0xfe}], 0xc0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x2, 0x70bd29, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004000}, 0x24000051) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x2, 0x70bd26, 0x25dfdbfe, {0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x2000010) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/bus/platform', 0x400000, 0x40) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x3fa, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000004) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, 0x3f9, 0x300, 0x70bd27, 0x25dfdbfe, {0x1, 0x1}, ["", "", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x24040011}, 0x44010) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x81, @private0, 0x2}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1, {[0x73, 0x2, 0x10000, 0x1, 0x3, 0x9, 0xccf3, 0x7f]}}, 0x5c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x800, 0x3, 0x1f, 0x4}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x10) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x2, 0x70bd29, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004000}, 0x24000051) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x2, 0x70bd29, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004000}, 0x24000051) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) [ 2298.074611][T24017] tipc: Enabling of bearer rejected, already enabled [ 2298.130719][T24042] tipc: Enabling of bearer rejected, already enabled [ 2298.163277][T24042] tipc: Enabling of bearer rejected, failed to enable media 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x2, 0x70bd29, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004000}, 0x24000051) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x2, 0x70bd29, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004000}, 0x24000051) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x2, 0x70bd26, 0x25dfdbfe, {0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x2000010) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/bus/platform', 0x400000, 0x40) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x3fa, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000004) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, 0x3f9, 0x300, 0x70bd27, 0x25dfdbfe, {0x1, 0x1}, ["", "", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x24040011}, 0x44010) 07:48:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x402, 0x0}}, 0xfffffdef) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async, rerun: 64) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x81, @private0, 0x2}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1, {[0x73, 0x2, 0x10000, 0x1, 0x3, 0x9, 0xccf3, 0x7f]}}, 0x5c) (async, rerun: 64) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x800, 0x3, 0x1f, 0x4}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x10) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0), 0x5e100, 0x408) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x4000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000480)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000500), 0x3, {0xa, 0x4e21, 0x24b, @dev={0xfe, 0x80, '\x00', 0x26}, 0x81}, r5}}, 0x38) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x10, r1, 0x10000000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r9}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r9}}, 0xc) 07:48:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async, rerun: 32) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000000)=[{0x2, 0x2, {0x2, 0x0, 0x4}, {0x0, 0x0, 0x4}, 0x2, 0x1}, {0x2, 0x2, {0x1, 0x1, 0x1}, {0x0, 0xff}, 0xff, 0xfd}, {0x2, 0x1, {0x0, 0x0, 0x3}, {0x2, 0xf0}, 0xfe, 0xfe}, {0x0, 0x3, {0x1, 0x1}, {0x1, 0x1, 0x2}, 0x1}, {0x2, 0x2, {0x1, 0xf0, 0x4}, {0x2, 0xff}, 0xff}, {0x0, 0x2, {0x0, 0xf0, 0x3}, {0x2, 0x1, 0x1}, 0xfd, 0xfe}], 0xc0) (async, rerun: 32) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x81, @private0, 0x2}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1, {[0x73, 0x2, 0x10000, 0x1, 0x3, 0x9, 0xccf3, 0x7f]}}, 0x5c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x800, 0x3, 0x1f, 0x4}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x81, @private0, 0x2}, {0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}, 0x1, {[0x73, 0x2, 0x10000, 0x1, 0x3, 0x9, 0xccf3, 0x7f]}}, 0x5c) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x800, 0x3, 0x1f, 0x4}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x10) (async) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x2, 0x70bd26, 0x25dfdbfe, {0x1}, ["", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x2000010) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/bus/platform', 0x400000, 0x40) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x20, 0x3fa, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000004) (async) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, 0x3f9, 0x300, 0x70bd27, 0x25dfdbfe, {0x1, 0x1}, ["", "", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x24040011}, 0x44010) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8050}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0), 0x5e100, 0x408) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x4000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000480)={0xa, 0x4, 0xfa00, {r5}}, 0xc) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000500), 0x3, {0xa, 0x4e21, 0x24b, @dev={0xfe, 0x80, '\x00', 0x26}, 0x81}, r5}}, 0x38) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x10, r1, 0x10000000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r9}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r9}}, 0xc) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xd9, "eb0b62", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1000}, {0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x3, r3, 0x10, 0x1, @in={0x2, 0x4e23, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0), 0x5e100, 0x408) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x4000, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000480)={0xa, 0x4, 0xfa00, {r5}}, 0xc) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000500), 0x3, {0xa, 0x4e21, 0x24b, @dev={0xfe, 0x80, '\x00', 0x26}, 0x81}, r5}}, 0x38) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x10, r1, 0x10000000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r9}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r6, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r9}}, 0xc) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8050}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8050}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) [ 2298.350984][T24076] tipc: Enabling of bearer rejected, already enabled [ 2298.379593][T24076] tipc: Enabling of bearer rejected, failed to enable media [ 2298.400742][T24090] tipc: Enabling of bearer rejected, failed to enable media 07:48:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x406, 0x0}}, 0xfffffdef) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xd9, "eb0b62", "f3bbb0d9f1ff4b1e425a9522a8a23cd91f1c38247e1113f3c58980f23e66ca70242b2dd3eaf2f4d675b474badf8a2e7037b76f1b32bb2a1f3d9dd3541491191440c940dd32b0675c7bdc8b2168e62dafba6354538a1d69768af91b62d60e9a93bb4c6fc4b8bd13bfb65be08978147a0976ab399549556dac84b3e78e98092091010e23422125897d0282bc7f2b8cf9e22ea1611755e6c753f3694c22e7156b3e32c00250e8fd905581922d57fa635d592624beb3a633c134b69a105e64dc72c42789b6372b601a2eba295472be859ba4fed6973f8477db48a6ea9566b7270d042e2ef3572e04f7acf46cc6d845993ee716edbc5ebad798ead5c59fefc6a0cd20"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1000}, {0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, 0xffffffffffffffff, 0x8}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x3, r3, 0x10, 0x1, @in={0x2, 0x4e23, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/garp', 0x410680, 0xbe) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80582, 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r4, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000040)=r4) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8050}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8050}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) 07:48:43 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x401}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x840}, 0x24040040) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xd9, "eb0b62", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1000}, {0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x3, r3, 0x10, 0x1, @in={0x2, 0x4e23, @broadcast}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xd9, "eb0b62", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1000}, {0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, 0xffffffffffffffff, 0x8}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x3, r3, 0x10, 0x1, @in={0x2, 0x4e23, @broadcast}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/garp', 0x410680, 0xbe) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80582, 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r4, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000040)=r4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/garp', 0x410680, 0xbe) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80582, 0x0) (async) write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r4, 0x469d, 0x800}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000040)=r4) (async) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/garp', 0x410680, 0xbe) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x80582, 0x0) (async) write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000200)={r4, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000040)=r4) 07:48:43 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x401}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x840}, 0x24040040) (async) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x401}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x840}, 0x24040040) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000280)={"37cc899a732e605d5246d458ecd63cab", 0x0, 0x0, {0x6, 0x101}, {0x8, 0x5}, 0xfffffffffffffff9, [0x106b, 0x7, 0x1f, 0x4, 0xffff, 0xffffffffffffff99, 0xffff, 0x6, 0x16460000000, 0xcf77, 0x3ff, 0x0, 0x2, 0x6, 0x3, 0xea7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000380)={"7f3f7111dbe9714af919302c1561882c", r2, 0x0, {0x9, 0x36}, {0x1000, 0x7}, 0x7, [0x5, 0x0, 0x8000, 0x9, 0x3, 0x0, 0x0, 0x9, 0x80, 0x3, 0xff, 0x8, 0x8, 0x2, 0x2, 0x6]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x6f, 0xfa00, {&(0x7f0000000000), 0x3, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x3f, @remote, 0x9}}}, 0xa0) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20300, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e23, 0x9, @empty, 0x3036}}}, 0xa0) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x22}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socket$inet_sctp(0x2, 0x5, 0x84) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2298.595759][T24126] tipc: Enabling of bearer rejected, already enabled 07:48:43 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x500, 0x0}}, 0xfffffdef) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20300, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e23, 0x9, @empty, 0x3036}}}, 0xa0) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x22}}}, 0x90) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x22}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socket$inet_sctp(0x2, 0x5, 0x84) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x401}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x840}, 0x24040040) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x401}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x44}, 0x1, 0x0, 0x0, 0x840}, 0x24040040) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x476901, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) (async) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x22}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20300, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e23, 0x9, @empty, 0x3036}}}, 0xa0) 07:48:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async, rerun: 64) r1 = socket$igmp6(0xa, 0x3, 0x2) (rerun: 64) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000280)={"37cc899a732e605d5246d458ecd63cab", 0x0, 0x0, {0x6, 0x101}, {0x8, 0x5}, 0xfffffffffffffff9, [0x106b, 0x7, 0x1f, 0x4, 0xffff, 0xffffffffffffff99, 0xffff, 0x6, 0x16460000000, 0xcf77, 0x3ff, 0x0, 0x2, 0x6, 0x3, 0xea7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000380)={"7f3f7111dbe9714af919302c1561882c", r2, 0x0, {0x9, 0x36}, {0x1000, 0x7}, 0x7, [0x5, 0x0, 0x8000, 0x9, 0x3, 0x0, 0x0, 0x9, 0x80, 0x3, 0xff, 0x8, 0x8, 0x2, 0x2, 0x6]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x6f, 0xfa00, {&(0x7f0000000000), 0x3, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x3f, @remote, 0x9}}}, 0xa0) 07:48:43 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x476901, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) [ 2298.740317][T24149] tipc: Enabling of bearer rejected, already enabled 07:48:43 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000300), 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24000881) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/vub300', 0x40, 0xb0) setsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0xfffffffffffffffc, 0x0) [ 2298.801325][T24172] tipc: Enabling of bearer rejected, already enabled 07:48:44 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x476901, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x1c, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x400c044) 07:48:44 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000300), 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24000881) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/vub300', 0x40, 0xb0) setsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0xfffffffffffffffc, 0x0) 07:48:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000d40)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000740)=r1) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x501102, 0x0) sendmsg$802154_dgram(r3, &(0x7f00000003c0)={&(0x7f00000002c0), 0x14, &(0x7f0000000380)={&(0x7f0000000300)="2763881efd78d9405d42cec8127c36bd3b669a7403bcad4d35d11fc79fbce8b0db1feb03060455a7b923e144ecbe25505381e31f9440795be3519eefe8b1fd6bd34b6505bff55b3fb432ac076e422f956f17c5c0d4f1b7df0667b58fca26d570f691d44413d9019f165e6777f4e07d0c65", 0x71}}, 0x0) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000900)={0x43c, 0x3f3, 0xb00, 0x70bd26, 0x25dfdbfc, {0x0, 0x2, 0x34, [0xf30, 0x6, 0x3ffc0000, 0x45d, 0x1, 0x0, 0x1, 0x9, 0x80, 0x2, 0x3, 0x1, 0x81, 0x2, 0x5, 0xffffffc1, 0x1, 0x7, 0xb8, 0x7ff, 0x0, 0x6, 0x7f, 0x400, 0x1, 0x5, 0x400, 0x6, 0x3f, 0x7, 0x3f, 0x2, 0x7, 0x20, 0xcbe, 0x8000, 0x4, 0x20, 0x7, 0x1, 0xcde, 0x1, 0x9c7, 0x3ff, 0x7, 0xfffffd09, 0x6, 0x5, 0x4, 0x8, 0x8000, 0x0, 0x0, 0x6, 0x7, 0x6, 0x2, 0x9, 0x198, 0xfffffff9, 0x2, 0xfe, 0xfffffffb, 0x1b1], [0x5, 0x9fdb, 0x5fd, 0x8001, 0x3, 0x8, 0x0, 0x10000, 0xf5f, 0x3, 0xfffffff8, 0xcdb, 0x8000, 0x7c, 0xda, 0x2, 0x8, 0x7, 0xffff, 0x7, 0xfffffffd, 0xbf4, 0x7fff, 0x679f9c1f, 0x0, 0x9f, 0x2, 0x10000, 0x6, 0x4, 0xffff9210, 0x0, 0x6, 0x9, 0xfff, 0x1, 0xfffffffc, 0x80000001, 0x2, 0x4, 0x2, 0x9, 0x3, 0x20000000, 0x1, 0x100, 0x80000001, 0x200, 0x8, 0x80000001, 0x5, 0x4, 0x1, 0x80000001, 0x1ff, 0x6, 0x7, 0xe7, 0x8, 0x1, 0x9, 0x7, 0x5, 0x5], [0xfd7, 0x9, 0x9, 0x8, 0x0, 0x8, 0x4, 0x6, 0x1, 0x0, 0x1, 0x7, 0x4, 0x80000001, 0x1, 0x6, 0x4, 0x7fffffff, 0x0, 0x9, 0x21eb, 0x2000000, 0x8, 0x22fb2638, 0x8, 0x1, 0x6, 0x3, 0x7bf, 0x3, 0x5, 0xb4, 0x1, 0x8, 0x5, 0x400, 0xffffffff, 0x0, 0x328, 0x7, 0x5, 0xfffe0, 0x0, 0xfffffff7, 0x7, 0x5, 0x9, 0x0, 0x9, 0x50000, 0x80000000, 0x7, 0x7fff, 0x10001, 0x0, 0x100, 0x8, 0x2, 0xd8, 0x1ff, 0x0, 0x80, 0xffff0000], [0xa6, 0x1f, 0x80000001, 0x20, 0xfffff075, 0xb0, 0x5, 0x6, 0x6b, 0x2, 0x1, 0xfffffffe, 0x7, 0x6, 0x9, 0x1, 0xffffffe0, 0x9, 0x10000, 0x2, 0x8000, 0x0, 0xe1d, 0x800, 0x5, 0x4, 0x80000001, 0x32, 0x7fff, 0x1, 0xad, 0x800, 0x3f, 0x6, 0x112, 0x5, 0x7f, 0x6, 0x6, 0x1, 0x7b, 0x80000000, 0x6, 0xda, 0x9e0, 0x7, 0x7fffffff, 0x3, 0x6, 0x7ff, 0xeb9, 0x1000, 0xff, 0x40, 0x9, 0x0, 0x8, 0x8, 0xe20, 0x20, 0x0, 0x10000, 0x72, 0xd3], 0x1c, ['@!\\).:\xd2:\x1c-],%/}.\x00', '/dev/bsg\x00', '$\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x24004000}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x4, 0x0, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000400)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1565ed", "1403ccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd7be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e95986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc900"}}, 0xfffffffffffffe67) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x434}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:48:44 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x600, 0x0}}, 0xfffffdef) 07:48:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000d40)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000740)=r1) (async) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x501102, 0x0) sendmsg$802154_dgram(r3, &(0x7f00000003c0)={&(0x7f00000002c0), 0x14, &(0x7f0000000380)={&(0x7f0000000300)="2763881efd78d9405d42cec8127c36bd3b669a7403bcad4d35d11fc79fbce8b0db1feb03060455a7b923e144ecbe25505381e31f9440795be3519eefe8b1fd6bd34b6505bff55b3fb432ac076e422f956f17c5c0d4f1b7df0667b58fca26d570f691d44413d9019f165e6777f4e07d0c65", 0x71}}, 0x0) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000900)={0x43c, 0x3f3, 0xb00, 0x70bd26, 0x25dfdbfc, {0x0, 0x2, 0x34, [0xf30, 0x6, 0x3ffc0000, 0x45d, 0x1, 0x0, 0x1, 0x9, 0x80, 0x2, 0x3, 0x1, 0x81, 0x2, 0x5, 0xffffffc1, 0x1, 0x7, 0xb8, 0x7ff, 0x0, 0x6, 0x7f, 0x400, 0x1, 0x5, 0x400, 0x6, 0x3f, 0x7, 0x3f, 0x2, 0x7, 0x20, 0xcbe, 0x8000, 0x4, 0x20, 0x7, 0x1, 0xcde, 0x1, 0x9c7, 0x3ff, 0x7, 0xfffffd09, 0x6, 0x5, 0x4, 0x8, 0x8000, 0x0, 0x0, 0x6, 0x7, 0x6, 0x2, 0x9, 0x198, 0xfffffff9, 0x2, 0xfe, 0xfffffffb, 0x1b1], [0x5, 0x9fdb, 0x5fd, 0x8001, 0x3, 0x8, 0x0, 0x10000, 0xf5f, 0x3, 0xfffffff8, 0xcdb, 0x8000, 0x7c, 0xda, 0x2, 0x8, 0x7, 0xffff, 0x7, 0xfffffffd, 0xbf4, 0x7fff, 0x679f9c1f, 0x0, 0x9f, 0x2, 0x10000, 0x6, 0x4, 0xffff9210, 0x0, 0x6, 0x9, 0xfff, 0x1, 0xfffffffc, 0x80000001, 0x2, 0x4, 0x2, 0x9, 0x3, 0x20000000, 0x1, 0x100, 0x80000001, 0x200, 0x8, 0x80000001, 0x5, 0x4, 0x1, 0x80000001, 0x1ff, 0x6, 0x7, 0xe7, 0x8, 0x1, 0x9, 0x7, 0x5, 0x5], [0xfd7, 0x9, 0x9, 0x8, 0x0, 0x8, 0x4, 0x6, 0x1, 0x0, 0x1, 0x7, 0x4, 0x80000001, 0x1, 0x6, 0x4, 0x7fffffff, 0x0, 0x9, 0x21eb, 0x2000000, 0x8, 0x22fb2638, 0x8, 0x1, 0x6, 0x3, 0x7bf, 0x3, 0x5, 0xb4, 0x1, 0x8, 0x5, 0x400, 0xffffffff, 0x0, 0x328, 0x7, 0x5, 0xfffe0, 0x0, 0xfffffff7, 0x7, 0x5, 0x9, 0x0, 0x9, 0x50000, 0x80000000, 0x7, 0x7fff, 0x10001, 0x0, 0x100, 0x8, 0x2, 0xd8, 0x1ff, 0x0, 0x80, 0xffff0000], [0xa6, 0x1f, 0x80000001, 0x20, 0xfffff075, 0xb0, 0x5, 0x6, 0x6b, 0x2, 0x1, 0xfffffffe, 0x7, 0x6, 0x9, 0x1, 0xffffffe0, 0x9, 0x10000, 0x2, 0x8000, 0x0, 0xe1d, 0x800, 0x5, 0x4, 0x80000001, 0x32, 0x7fff, 0x1, 0xad, 0x800, 0x3f, 0x6, 0x112, 0x5, 0x7f, 0x6, 0x6, 0x1, 0x7b, 0x80000000, 0x6, 0xda, 0x9e0, 0x7, 0x7fffffff, 0x3, 0x6, 0x7ff, 0xeb9, 0x1000, 0xff, 0x40, 0x9, 0x0, 0x8, 0x8, 0xe20, 0x20, 0x0, 0x10000, 0x72, 0xd3], 0x1c, ['@!\\).:\xd2:\x1c-],%/}.\x00', '/dev/bsg\x00', '$\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x24004000}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x4, 0x0, 0xff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000400)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1565ed", "1403ccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd7be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e95986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc900"}}, 0xfffffffffffffe67) (async) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x434}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:48:44 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000300), 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24000881) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/vub300', 0x40, 0xb0) setsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0xfffffffffffffffc, 0x0) 07:48:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x1c, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x400c044) 07:48:44 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, {0xa, 0x4e22, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1ff}, 0xffffffffffffffff, 0x80}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000002c0)={"c21dd59e6ea687eac30c463a23509f31", 0x0, 0x0, {0x0, 0xabcd}, {0x400, 0xffffffe0}, 0x9c, [0x100000000, 0x74c, 0xf1, 0xfff, 0x10000, 0x40, 0xff, 0x6, 0x81, 0xfffffffffffffc01, 0x8000, 0x1, 0xffffffff, 0xb, 0xde]}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x2, 0xfa00, {r6, 0x32}}, 0x10) [ 2298.940231][T24191] tipc: Enabling of bearer rejected, already enabled 07:48:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000d40)) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000d40)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000740)=r1) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) (async) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0x501102, 0x0) sendmsg$802154_dgram(r3, &(0x7f00000003c0)={&(0x7f00000002c0), 0x14, &(0x7f0000000380)={&(0x7f0000000300)="2763881efd78d9405d42cec8127c36bd3b669a7403bcad4d35d11fc79fbce8b0db1feb03060455a7b923e144ecbe25505381e31f9440795be3519eefe8b1fd6bd34b6505bff55b3fb432ac076e422f956f17c5c0d4f1b7df0667b58fca26d570f691d44413d9019f165e6777f4e07d0c65", 0x71}}, 0x0) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000900)={0x43c, 0x3f3, 0xb00, 0x70bd26, 0x25dfdbfc, {0x0, 0x2, 0x34, [0xf30, 0x6, 0x3ffc0000, 0x45d, 0x1, 0x0, 0x1, 0x9, 0x80, 0x2, 0x3, 0x1, 0x81, 0x2, 0x5, 0xffffffc1, 0x1, 0x7, 0xb8, 0x7ff, 0x0, 0x6, 0x7f, 0x400, 0x1, 0x5, 0x400, 0x6, 0x3f, 0x7, 0x3f, 0x2, 0x7, 0x20, 0xcbe, 0x8000, 0x4, 0x20, 0x7, 0x1, 0xcde, 0x1, 0x9c7, 0x3ff, 0x7, 0xfffffd09, 0x6, 0x5, 0x4, 0x8, 0x8000, 0x0, 0x0, 0x6, 0x7, 0x6, 0x2, 0x9, 0x198, 0xfffffff9, 0x2, 0xfe, 0xfffffffb, 0x1b1], [0x5, 0x9fdb, 0x5fd, 0x8001, 0x3, 0x8, 0x0, 0x10000, 0xf5f, 0x3, 0xfffffff8, 0xcdb, 0x8000, 0x7c, 0xda, 0x2, 0x8, 0x7, 0xffff, 0x7, 0xfffffffd, 0xbf4, 0x7fff, 0x679f9c1f, 0x0, 0x9f, 0x2, 0x10000, 0x6, 0x4, 0xffff9210, 0x0, 0x6, 0x9, 0xfff, 0x1, 0xfffffffc, 0x80000001, 0x2, 0x4, 0x2, 0x9, 0x3, 0x20000000, 0x1, 0x100, 0x80000001, 0x200, 0x8, 0x80000001, 0x5, 0x4, 0x1, 0x80000001, 0x1ff, 0x6, 0x7, 0xe7, 0x8, 0x1, 0x9, 0x7, 0x5, 0x5], [0xfd7, 0x9, 0x9, 0x8, 0x0, 0x8, 0x4, 0x6, 0x1, 0x0, 0x1, 0x7, 0x4, 0x80000001, 0x1, 0x6, 0x4, 0x7fffffff, 0x0, 0x9, 0x21eb, 0x2000000, 0x8, 0x22fb2638, 0x8, 0x1, 0x6, 0x3, 0x7bf, 0x3, 0x5, 0xb4, 0x1, 0x8, 0x5, 0x400, 0xffffffff, 0x0, 0x328, 0x7, 0x5, 0xfffe0, 0x0, 0xfffffff7, 0x7, 0x5, 0x9, 0x0, 0x9, 0x50000, 0x80000000, 0x7, 0x7fff, 0x10001, 0x0, 0x100, 0x8, 0x2, 0xd8, 0x1ff, 0x0, 0x80, 0xffff0000], [0xa6, 0x1f, 0x80000001, 0x20, 0xfffff075, 0xb0, 0x5, 0x6, 0x6b, 0x2, 0x1, 0xfffffffe, 0x7, 0x6, 0x9, 0x1, 0xffffffe0, 0x9, 0x10000, 0x2, 0x8000, 0x0, 0xe1d, 0x800, 0x5, 0x4, 0x80000001, 0x32, 0x7fff, 0x1, 0xad, 0x800, 0x3f, 0x6, 0x112, 0x5, 0x7f, 0x6, 0x6, 0x1, 0x7b, 0x80000000, 0x6, 0xda, 0x9e0, 0x7, 0x7fffffff, 0x3, 0x6, 0x7ff, 0xeb9, 0x1000, 0xff, 0x40, 0x9, 0x0, 0x8, 0x8, 0xe20, 0x20, 0x0, 0x10000, 0x72, 0xd3], 0x1c, ['@!\\).:\xd2:\x1c-],%/}.\x00', '/dev/bsg\x00', '$\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x24004000}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x4, 0x0, 0xff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x4, 0x0, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000400)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1565ed", "1403ccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd7be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e95986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc900"}}, 0xfffffffffffffe67) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x434}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:48:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x1c, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x400c044) 07:48:44 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x220000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0x0, 0x1, 0xc, 0x6}, {0x80, 0x1, 0x3, 0x1}, {0x9, 0x3, 0x8, 0x3f}, {0x1, 0x80, 0x3, 0x7fffffff}, {0x1, 0x5, 0xf3, 0x6}, {0x6, 0x8, 0x5, 0x4}, {0x0, 0x10, 0x2, 0xfffffff7}, {0x3f, 0xb, 0x9, 0xfff}, {0x2c16, 0x80, 0xbe, 0x2}, {0x5, 0x81, 0x3, 0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000180)={0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x0, r7, 0x7, 0x80000}) 07:48:44 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, {0xa, 0x4e22, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1ff}, 0xffffffffffffffff, 0x80}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000002c0)={"c21dd59e6ea687eac30c463a23509f31", 0x0, 0x0, {0x0, 0xabcd}, {0x400, 0xffffffe0}, 0x9c, [0x100000000, 0x74c, 0xf1, 0xfff, 0x10000, 0x40, 0xff, 0x6, 0x81, 0xfffffffffffffc01, 0x8000, 0x1, 0xffffffff, 0xb, 0xde]}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x2, 0xfa00, {r6, 0x32}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, {0xa, 0x4e22, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1ff}, 0xffffffffffffffff, 0x80}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000002c0)={"c21dd59e6ea687eac30c463a23509f31", 0x0, 0x0, {0x0, 0xabcd}, {0x400, 0xffffffe0}, 0x9c, [0x100000000, 0x74c, 0xf1, 0xfff, 0x10000, 0x40, 0xff, 0x6, 0x81, 0xfffffffffffffc01, 0x8000, 0x1, 0xffffffff, 0xb, 0xde]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x2, 0xfa00, {r6, 0x32}}, 0x10) (async) 07:48:44 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) socket$igmp6(0xa, 0x3, 0x2) (async) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000280)={"37cc899a732e605d5246d458ecd63cab", 0x0, 0x0, {0x6, 0x101}, {0x8, 0x5}, 0xfffffffffffffff9, [0x106b, 0x7, 0x1f, 0x4, 0xffff, 0xffffffffffffff99, 0xffff, 0x6, 0x16460000000, 0xcf77, 0x3ff, 0x0, 0x2, 0x6, 0x3, 0xea7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000380)={"7f3f7111dbe9714af919302c1561882c", r2, 0x0, {0x9, 0x36}, {0x1000, 0x7}, 0x7, [0x5, 0x0, 0x8000, 0x9, 0x3, 0x0, 0x0, 0x9, 0x80, 0x3, 0xff, 0x8, 0x8, 0x2, 0x2, 0x6]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x6f, 0xfa00, {&(0x7f0000000000), 0x3, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x3f, @remote, 0x9}}}, 0xa0) 07:48:44 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x604, 0x0}}, 0xfffffdef) 07:48:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) 07:48:44 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, {0xa, 0x4e22, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1ff}, 0xffffffffffffffff, 0x80}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000002c0)={"c21dd59e6ea687eac30c463a23509f31", 0x0, 0x0, {0x0, 0xabcd}, {0x400, 0xffffffe0}, 0x9c, [0x100000000, 0x74c, 0xf1, 0xfff, 0x10000, 0x40, 0xff, 0x6, 0x81, 0xfffffffffffffc01, 0x8000, 0x1, 0xffffffff, 0xb, 0xde]}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x2, 0xfa00, {r6, 0x32}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, {0xa, 0x4e22, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1ff}, 0xffffffffffffffff, 0x80}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f00000002c0)={"c21dd59e6ea687eac30c463a23509f31", 0x0, 0x0, {0x0, 0xabcd}, {0x400, 0xffffffe0}, 0x9c, [0x100000000, 0x74c, 0xf1, 0xfff, 0x10000, 0x40, 0xff, 0x6, 0x81, 0xfffffffffffffc01, 0x8000, 0x1, 0xffffffff, 0xb, 0xde]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r6}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x2, 0xfa00, {r6, 0x32}}, 0x10) (async) 07:48:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 07:48:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 07:48:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) [ 2299.783162][T24223] tipc: Enabling of bearer rejected, already enabled [ 2299.804460][T24227] tipc: Enabling of bearer rejected, failed to enable media 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x40}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x2400c804) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) connect$nfc_raw(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x1}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "1525ed", "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"}}, 0x110) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x106}}, 0xfe0d) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xb99}}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bpa10x', 0x2000, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000180)={@multicast1, 0x0, 0x0, 0x80, 0x0, [{@multicast2}, {}, {@multicast2}, {@broadcast}, {}, {@private}, {@initdev}, {}]}}) [ 2299.841059][T24238] tipc: Enabling of bearer rejected, failed to enable media [ 2299.871671][T24252] tipc: Enabling of bearer rejected, already enabled [ 2299.893849][T24254] tipc: Enabling of bearer rejected, failed to enable media 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) (async) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x106}}, 0xfe0d) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xb99}}, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bpa10x', 0x2000, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000180)={@multicast1, 0x0, 0x0, 0x80, 0x0, [{@multicast2}, {}, {@multicast2}, {@broadcast}, {}, {@private}, {@initdev}, {}]}}) 07:48:45 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) connect$nfc_raw(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x1}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) 07:48:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x810, 0x0}}, 0xfffffdef) 07:48:45 executing program 1: r0 = socket(0x2a, 0x80000, 0x5) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040), 0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2e803, 0x408) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_getroute={0x100, 0x1a, 0x0, 0x70bd27, 0x25dfdbfc, {0x1c, 0x14, 0x0, 0x5, 0xfe, 0x1, 0xfd, 0x1}, [@RTA_VIA={0x14, 0x12, {0x1, "e0742f99f092da4690028f53c2c8"}}, @RTA_NEWDST={0x84, 0x13, [{0x6ab9, 0x0, 0x1}, {0x4}, {0xfff00, 0x0, 0x1}, {0x20}, {0x6}, {0x3, 0x0, 0x1}, {0x5f3e, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x4}, {0x1000, 0x0, 0x1}, {0x7ff, 0x0, 0x1}, {0x136}, {0xc7}, {0x1f}, {0x1f}, {0x2, 0x0, 0x1}, {}, {0x7, 0x0, 0x1}, {0x3a, 0x0, 0x1}, {0xb2, 0x0, 0x1}, {0x5}, {0x401}, {0x5, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x400, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x80}, {0x7}, {0x1d9, 0x0, 0x1}, {0x6}, {0x1}, {0x101}]}, @RTA_VIA={0x14, 0x12, {0x34, "442bd2b5285f7090b30dceb6ab08"}}, @RTA_OIF={0x8, 0x4, r3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x7f}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x10, 0x3f}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x7, 0x30, 0xe1}}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x40483d0a) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x106}}, 0xfe0d) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xb99}}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bpa10x', 0x2000, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000180)={@multicast1, 0x0, 0x0, 0x80, 0x0, [{@multicast2}, {}, {@multicast2}, {@broadcast}, {}, {@private}, {@initdev}, {}]}}) 07:48:45 executing program 1: r0 = socket(0x2a, 0x80000, 0x5) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040), 0x4) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2e803, 0x408) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_getroute={0x100, 0x1a, 0x0, 0x70bd27, 0x25dfdbfc, {0x1c, 0x14, 0x0, 0x5, 0xfe, 0x1, 0xfd, 0x1}, [@RTA_VIA={0x14, 0x12, {0x1, "e0742f99f092da4690028f53c2c8"}}, @RTA_NEWDST={0x84, 0x13, [{0x6ab9, 0x0, 0x1}, {0x4}, {0xfff00, 0x0, 0x1}, {0x20}, {0x6}, {0x3, 0x0, 0x1}, {0x5f3e, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x4}, {0x1000, 0x0, 0x1}, {0x7ff, 0x0, 0x1}, {0x136}, {0xc7}, {0x1f}, {0x1f}, {0x2, 0x0, 0x1}, {}, {0x7, 0x0, 0x1}, {0x3a, 0x0, 0x1}, {0xb2, 0x0, 0x1}, {0x5}, {0x401}, {0x5, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x400, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x80}, {0x7}, {0x1d9, 0x0, 0x1}, {0x6}, {0x1}, {0x101}]}, @RTA_VIA={0x14, 0x12, {0x34, "442bd2b5285f7090b30dceb6ab08"}}, @RTA_OIF={0x8, 0x4, r3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x7f}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x10, 0x3f}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x7, 0x30, 0xe1}}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x800) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x40483d0a) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) connect$nfc_raw(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x1}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "42b501", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c3b42ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000)=0x2, 0x4) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000080)={0x430, 0x3f4, 0x300, 0x70bd26, 0x25dfdbfd, {0x3, 0x0, 0x8, [0x1, 0x4, 0x2a, 0x55b9f6be, 0x2, 0x7, 0xfffffffb, 0x400, 0x6, 0x0, 0x6, 0x3, 0x9, 0x81, 0x7f, 0x200, 0x58f, 0xffffffff, 0x8, 0x400, 0xdc, 0xa7800000, 0xffffffe2, 0xdda6, 0x1, 0x4, 0x7fff, 0x4, 0x1, 0xffffe791, 0xecb5, 0xfffff68e, 0xfffffffe, 0x6c, 0x4, 0x3, 0x3, 0x8, 0xe3a8, 0xfffffff9, 0x1000, 0x2, 0xebe, 0x4, 0x400, 0x1, 0x0, 0x65bb1f54, 0x74e, 0x7fff, 0xf23f, 0x3, 0x8, 0x7, 0x1, 0x200000, 0x7ff, 0x5, 0x0, 0x38000000, 0x200, 0x1, 0x8a5a, 0x100], [0x0, 0x8, 0x800, 0x9, 0xffffffff, 0x2, 0x2, 0x81, 0xd5, 0x7fffffff, 0xc5e, 0x7, 0x80000001, 0x6, 0x10001, 0x9, 0x6, 0xfffffff8, 0x81, 0x4, 0x1c, 0x4, 0xffffffff, 0x401, 0x0, 0x80000000, 0x2, 0x8, 0x89, 0x0, 0x6, 0x7f, 0x7, 0x80000001, 0x2f, 0x2, 0x7, 0xa019, 0x2, 0x1, 0x0, 0x8, 0x9, 0x6, 0x9, 0x4, 0x4, 0x7, 0x10000, 0x1, 0xfda, 0x8, 0x1, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1f, 0x8000, 0xfffffffb, 0x3, 0x2, 0x101], [0x1, 0x9, 0x7, 0x3f, 0x0, 0x7fffffff, 0x1ee, 0x8, 0x81, 0x2, 0x5, 0x10000, 0x4, 0x7fff, 0x401, 0xfffffff8, 0x3ff, 0xffff, 0x8, 0x6, 0x70, 0x1, 0x4, 0xcc3b, 0x2, 0x6, 0x317, 0x0, 0x9, 0x8001, 0x1, 0x180a2eb6, 0x7, 0x5, 0x7dcf, 0x80000001, 0x0, 0x9, 0x0, 0x0, 0x81, 0xfffffffe, 0x1ff, 0xd68, 0xffff8001, 0x6, 0x5, 0x2, 0x20000000, 0x65, 0xa67, 0x5, 0x3f, 0x3, 0x101, 0x3f, 0x8, 0x8, 0x4, 0x1f, 0x1, 0xd5c2, 0x7, 0x1b823c83], [0x8, 0x5e, 0x6, 0xf11, 0x6, 0x8, 0x6, 0x0, 0xbec3, 0x81, 0x6, 0x4, 0x3ff, 0x1, 0xffff0000, 0x0, 0x4, 0x2432, 0x1, 0x401, 0x6, 0x9, 0x7, 0x200, 0x20, 0x1ff, 0x8, 0x7ff, 0x7fff, 0x2, 0x9, 0x80000001, 0x8a, 0xf2fc, 0x3, 0x7, 0x8, 0x8001, 0xb48, 0xff, 0x3f, 0x3ff, 0x7f, 0x7, 0x9, 0x81, 0x1, 0x6, 0x9, 0x3, 0xff, 0x40, 0x7, 0xc9c, 0x5, 0x2, 0x9, 0x393e, 0xfffffff9, 0xc9, 0x3, 0x9, 0x5c1, 0xd8a9], 0xe, ['\x00', '&$i%\xa9*+,]\x00', ',\x00', '\x00']}, ["", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000006c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000680), 0x3, {0xa, 0x4e22, 0x546, @loopback, 0x800000}, r3}}, 0x38) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/module/ipaq', 0x20002, 0x2) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x16, 0x4, @udp='udp:syz0\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x880) [ 2300.012773][T24260] tipc: Enabling of bearer rejected, failed to enable media [ 2300.039479][T24272] tipc: Enabling of bearer rejected, already enabled 07:48:45 executing program 1: r0 = socket(0x2a, 0x80000, 0x5) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040), 0x4) (async) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040), 0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2e803, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@mpls_getroute={0x100, 0x1a, 0x0, 0x70bd27, 0x25dfdbfc, {0x1c, 0x14, 0x0, 0x5, 0xfe, 0x1, 0xfd, 0x1}, [@RTA_VIA={0x14, 0x12, {0x1, "e0742f99f092da4690028f53c2c8"}}, @RTA_NEWDST={0x84, 0x13, [{0x6ab9, 0x0, 0x1}, {0x4}, {0xfff00, 0x0, 0x1}, {0x20}, {0x6}, {0x3, 0x0, 0x1}, {0x5f3e, 0x0, 0x1}, {0x200, 0x0, 0x1}, {0x4}, {0x1000, 0x0, 0x1}, {0x7ff, 0x0, 0x1}, {0x136}, {0xc7}, {0x1f}, {0x1f}, {0x2, 0x0, 0x1}, {}, {0x7, 0x0, 0x1}, {0x3a, 0x0, 0x1}, {0xb2, 0x0, 0x1}, {0x5}, {0x401}, {0x5, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x400, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0x80}, {0x7}, {0x1d9, 0x0, 0x1}, {0x6}, {0x1}, {0x101}]}, @RTA_VIA={0x14, 0x12, {0x34, "442bd2b5285f7090b30dceb6ab08"}}, @RTA_OIF={0x8, 0x4, r3}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x7f}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x10, 0x3f}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x1}, @RTA_MULTIPATH={0xc, 0x9, {0x7, 0x30, 0xe1}}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x40483d0a) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 32) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "42b501", "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"}}, 0x110) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "42b501", "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"}}, 0x110) [ 2300.094818][T24292] tipc: Enabling of bearer rejected, already enabled [ 2300.116358][T24291] tipc: Enabling of bearer rejected, failed to enable media 07:48:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xc00, 0x0}}, 0xfffffdef) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000080)={0x430, 0x3f4, 0x300, 0x70bd26, 0x25dfdbfd, {0x3, 0x0, 0x8, [0x1, 0x4, 0x2a, 0x55b9f6be, 0x2, 0x7, 0xfffffffb, 0x400, 0x6, 0x0, 0x6, 0x3, 0x9, 0x81, 0x7f, 0x200, 0x58f, 0xffffffff, 0x8, 0x400, 0xdc, 0xa7800000, 0xffffffe2, 0xdda6, 0x1, 0x4, 0x7fff, 0x4, 0x1, 0xffffe791, 0xecb5, 0xfffff68e, 0xfffffffe, 0x6c, 0x4, 0x3, 0x3, 0x8, 0xe3a8, 0xfffffff9, 0x1000, 0x2, 0xebe, 0x4, 0x400, 0x1, 0x0, 0x65bb1f54, 0x74e, 0x7fff, 0xf23f, 0x3, 0x8, 0x7, 0x1, 0x200000, 0x7ff, 0x5, 0x0, 0x38000000, 0x200, 0x1, 0x8a5a, 0x100], [0x0, 0x8, 0x800, 0x9, 0xffffffff, 0x2, 0x2, 0x81, 0xd5, 0x7fffffff, 0xc5e, 0x7, 0x80000001, 0x6, 0x10001, 0x9, 0x6, 0xfffffff8, 0x81, 0x4, 0x1c, 0x4, 0xffffffff, 0x401, 0x0, 0x80000000, 0x2, 0x8, 0x89, 0x0, 0x6, 0x7f, 0x7, 0x80000001, 0x2f, 0x2, 0x7, 0xa019, 0x2, 0x1, 0x0, 0x8, 0x9, 0x6, 0x9, 0x4, 0x4, 0x7, 0x10000, 0x1, 0xfda, 0x8, 0x1, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1f, 0x8000, 0xfffffffb, 0x3, 0x2, 0x101], [0x1, 0x9, 0x7, 0x3f, 0x0, 0x7fffffff, 0x1ee, 0x8, 0x81, 0x2, 0x5, 0x10000, 0x4, 0x7fff, 0x401, 0xfffffff8, 0x3ff, 0xffff, 0x8, 0x6, 0x70, 0x1, 0x4, 0xcc3b, 0x2, 0x6, 0x317, 0x0, 0x9, 0x8001, 0x1, 0x180a2eb6, 0x7, 0x5, 0x7dcf, 0x80000001, 0x0, 0x9, 0x0, 0x0, 0x81, 0xfffffffe, 0x1ff, 0xd68, 0xffff8001, 0x6, 0x5, 0x2, 0x20000000, 0x65, 0xa67, 0x5, 0x3f, 0x3, 0x101, 0x3f, 0x8, 0x8, 0x4, 0x1f, 0x1, 0xd5c2, 0x7, 0x1b823c83], [0x8, 0x5e, 0x6, 0xf11, 0x6, 0x8, 0x6, 0x0, 0xbec3, 0x81, 0x6, 0x4, 0x3ff, 0x1, 0xffff0000, 0x0, 0x4, 0x2432, 0x1, 0x401, 0x6, 0x9, 0x7, 0x200, 0x20, 0x1ff, 0x8, 0x7ff, 0x7fff, 0x2, 0x9, 0x80000001, 0x8a, 0xf2fc, 0x3, 0x7, 0x8, 0x8001, 0xb48, 0xff, 0x3f, 0x3ff, 0x7f, 0x7, 0x9, 0x81, 0x1, 0x6, 0x9, 0x3, 0xff, 0x40, 0x7, 0xc9c, 0x5, 0x2, 0x9, 0x393e, 0xfffffff9, 0xc9, 0x3, 0x9, 0x5c1, 0xd8a9], 0xe, ['\x00', '&$i%\xa9*+,]\x00', ',\x00', '\x00']}, ["", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000006c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000680), 0x3, {0xa, 0x4e22, 0x546, @loopback, 0x800000}, r3}}, 0x38) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/module/ipaq', 0x20002, 0x2) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x16, 0x4, @udp='udp:syz0\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x880) 07:48:45 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/class/usb_power_delivery', 0x203, 0xa6) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv4_getrule={0x1c, 0x22, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x0, 0x10, 0xff, 0x8, 0x0, 0x0, 0x6, 0x10000}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40054}, 0x24004000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x10, 0x1, @ib={0x1b, 0x9, 0x1, {"04844588981484245fb13961107f6ef8"}, 0x5, 0x9, 0xff}}}, 0xa0) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000080)={0x430, 0x3f4, 0x300, 0x70bd26, 0x25dfdbfd, {0x3, 0x0, 0x8, [0x1, 0x4, 0x2a, 0x55b9f6be, 0x2, 0x7, 0xfffffffb, 0x400, 0x6, 0x0, 0x6, 0x3, 0x9, 0x81, 0x7f, 0x200, 0x58f, 0xffffffff, 0x8, 0x400, 0xdc, 0xa7800000, 0xffffffe2, 0xdda6, 0x1, 0x4, 0x7fff, 0x4, 0x1, 0xffffe791, 0xecb5, 0xfffff68e, 0xfffffffe, 0x6c, 0x4, 0x3, 0x3, 0x8, 0xe3a8, 0xfffffff9, 0x1000, 0x2, 0xebe, 0x4, 0x400, 0x1, 0x0, 0x65bb1f54, 0x74e, 0x7fff, 0xf23f, 0x3, 0x8, 0x7, 0x1, 0x200000, 0x7ff, 0x5, 0x0, 0x38000000, 0x200, 0x1, 0x8a5a, 0x100], [0x0, 0x8, 0x800, 0x9, 0xffffffff, 0x2, 0x2, 0x81, 0xd5, 0x7fffffff, 0xc5e, 0x7, 0x80000001, 0x6, 0x10001, 0x9, 0x6, 0xfffffff8, 0x81, 0x4, 0x1c, 0x4, 0xffffffff, 0x401, 0x0, 0x80000000, 0x2, 0x8, 0x89, 0x0, 0x6, 0x7f, 0x7, 0x80000001, 0x2f, 0x2, 0x7, 0xa019, 0x2, 0x1, 0x0, 0x8, 0x9, 0x6, 0x9, 0x4, 0x4, 0x7, 0x10000, 0x1, 0xfda, 0x8, 0x1, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1f, 0x8000, 0xfffffffb, 0x3, 0x2, 0x101], [0x1, 0x9, 0x7, 0x3f, 0x0, 0x7fffffff, 0x1ee, 0x8, 0x81, 0x2, 0x5, 0x10000, 0x4, 0x7fff, 0x401, 0xfffffff8, 0x3ff, 0xffff, 0x8, 0x6, 0x70, 0x1, 0x4, 0xcc3b, 0x2, 0x6, 0x317, 0x0, 0x9, 0x8001, 0x1, 0x180a2eb6, 0x7, 0x5, 0x7dcf, 0x80000001, 0x0, 0x9, 0x0, 0x0, 0x81, 0xfffffffe, 0x1ff, 0xd68, 0xffff8001, 0x6, 0x5, 0x2, 0x20000000, 0x65, 0xa67, 0x5, 0x3f, 0x3, 0x101, 0x3f, 0x8, 0x8, 0x4, 0x1f, 0x1, 0xd5c2, 0x7, 0x1b823c83], [0x8, 0x5e, 0x6, 0xf11, 0x6, 0x8, 0x6, 0x0, 0xbec3, 0x81, 0x6, 0x4, 0x3ff, 0x1, 0xffff0000, 0x0, 0x4, 0x2432, 0x1, 0x401, 0x6, 0x9, 0x7, 0x200, 0x20, 0x1ff, 0x8, 0x7ff, 0x7fff, 0x2, 0x9, 0x80000001, 0x8a, 0xf2fc, 0x3, 0x7, 0x8, 0x8001, 0xb48, 0xff, 0x3f, 0x3ff, 0x7f, 0x7, 0x9, 0x81, 0x1, 0x6, 0x9, 0x3, 0xff, 0x40, 0x7, 0xc9c, 0x5, 0x2, 0x9, 0x393e, 0xfffffff9, 0xc9, 0x3, 0x9, 0x5c1, 0xd8a9], 0xe, ['\x00', '&$i%\xa9*+,]\x00', ',\x00', '\x00']}, ["", "", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000006c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000680), 0x3, {0xa, 0x4e22, 0x546, @loopback, 0x800000}, r3}}, 0x38) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/module/ipaq', 0x20002, 0x2) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x16, 0x4, @udp='udp:syz0\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x880) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/class/usb_power_delivery', 0x203, 0xa6) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv4_getrule={0x1c, 0x22, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x0, 0x10, 0xff, 0x8, 0x0, 0x0, 0x6, 0x10000}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40054}, 0x24004000) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x10, 0x1, @ib={0x1b, 0x9, 0x1, {"04844588981484245fb13961107f6ef8"}, 0x5, 0x9, 0xff}}}, 0xa0) 07:48:45 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) 07:48:45 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) (async) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) [ 2300.235777][T24317] tipc: Enabling of bearer rejected, failed to enable media 07:48:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x1008, 0x0}}, 0xfffffdef) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/class/usb_power_delivery', 0x203, 0xa6) (rerun: 32) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv4_getrule={0x1c, 0x22, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x0, 0x10, 0xff, 0x8, 0x0, 0x0, 0x6, 0x10000}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40054}, 0x24004000) (rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r4, 0x10, 0x1, @ib={0x1b, 0x9, 0x1, {"04844588981484245fb13961107f6ef8"}, 0x5, 0x9, 0xff}}}, 0xa0) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) kexec_load(0xfffffffffffffffd, 0x6, &(0x7f0000000380)=[{&(0x7f0000000040)="c3efe0a2a373a828b79948111873747e8209b7e6fe2572ea9f", 0x19, 0x0, 0x5}, {&(0x7f00000006c0)="1fcfb89cff98cf8b6588c0adcf4c05d043dee05ca25f7b2166aed494c1330a0d1cd01fdc20c8546892916ed0c8c7c29dd5fb8decc80b4973b062616320a0fb54eea8cb4f0995ea5e050bf989a0ee29269791", 0x52, 0x9, 0x3}, {&(0x7f00000000c0)="8d6c53", 0x3, 0x6}, {&(0x7f0000000100)="20099e503caddf78120767394d7d799880c4509d789765dab81f1994be2ff74fb77f5ed7e2599af1e2842d03d84217937c0ad09a9f4900a6755e74303685daa345502bf984e1c122ee4f0f3f2f02a3a0ea55a3cf3a2218afc5f0d9b94311d938d449d6216156261822f9651924cb9f692fa4415789c34b7263c92130", 0x7c, 0x7fffffffffffffff, 0x3}, {&(0x7f0000000180)="50046d134ebeaf52e432cfb4418630fc158b91b903f7cf71338e29df2b78eef21b7d16503de0c4969c5105574a52ece7600fbc1394727773d0a0858369c330", 0x3f, 0x101, 0xb35}, {&(0x7f0000000280)="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", 0xfd, 0x2, 0x7522}], 0x140000) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000080)={0x20, 0x3fa, 0x2, 0x70bd2c, 0x25dfdbfd, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4040045}, 0x2dc7d5050151e3cb) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8582824}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x20, 0x3fa, 0x10, 0x16, 0x25dfdbff, {0x1, 0x0, 0x0, 0x1}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) kexec_load(0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000440)="98fe0e78a752c4a0d729a381ebefdd1b343ad5f8f33d6c4499fbcd2d56df825a6a785887b1e37c9d5b82492ac67ce39a911810aeb9417108024eb8d209895d239e60a02f59c9b39c4c5d05eb2246b4ea68dc1b78590ba9fd22c5e98cd45cda72e335dd0a5aa2c98b2cb05519d80c827c53315d369000f8744fe735d78f72a182fecce2545475fcfdf2d15aba30b20a94448e5c20606cc4f51e660ffc35a46406e7b77b2979cd11388fc4001b80e1489d15e3c00c943b29426853fefa444c3edb4116911e33f10a38e76c2bc44c96e980971ce9651fff25af8bb865d5a2858ad907e38b86c63771", 0xe7, 0x4, 0x4}, {&(0x7f0000000540)="d1cbcd5078646f3f54b12456fc8c3cc1ec46cb3e3abc9a9ba499c440b9e55f87f029f6bea301809bc040d2f146286e20213507b05001b7116f9ecedc62eb1e9a13ab84eefe00e84451ab77569be82c8ec79157725db6dddcac406c2269bf327d39678d71e02f70814324855e9a911d0254377eefd110091d12baf15ea775aaa39258f4678f7b0c8fb435287810aec5f7", 0x90, 0x1, 0xa07}], 0x80000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700200000000000006574683a6970366772653000"], 0x34}}, 0x0) socketpair(0x3f, 0xa, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0xc, 0x13, @l2={'eth', 0x3a, '\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20008040) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x24040001}, 0x8005) write$nci(0xffffffffffffffff, &(0x7f0000000040)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x6, {0x1, 0xe4, 0xff, 0x0, 0x40, 0x3, 0xf, 0xff, 0xec, "9d521f31db4b334343b2a665f396fddbeb5e66f0b8d66041d9d1b6282ca68590724d4055089ce7da2a1672a90c4c3b27c9e20b781698f870b5958316af828f4a4ba9d84a5739e814ce6333739c83e9551c089efaa180d4734bcca3ae0e4a48633f5c82b891cd224b2496cb8b5527d404dea0f1059f96d2a6f4380e34416f623be9b84bbd9af99941970314c5b77ce9cdca760949b50e158712f4e4086a074f7958d8d377220c3e056d6db3e7d81ae88a816dd1fc318de358ac9840bddc89bbb526985879dff4707b74007b930c558a99ba7e0d0dd1cec64b9108238a671f11d6ffd5cbdc9a576dc95074b452"}}, 0xfd) 07:48:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/event_source', 0x181a01, 0x2) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) 07:48:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/event_source', 0x181a01, 0x2) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x6}, {0xa, 0x4e24, 0x7, @private2, 0x5}, 0xffffffffffffffff, {[0x8, 0x2, 0x9, 0x8000, 0x1, 0x20, 0x8, 0x4]}}, 0x5c) socket$l2tp6(0xa, 0x2, 0x73) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x200000000}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 07:48:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/event_source', 0x181a01, 0x2) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/event_source', 0x181a01, 0x2) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) (async) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x6}, {0xa, 0x4e24, 0x7, @private2, 0x5}, 0xffffffffffffffff, {[0x8, 0x2, 0x9, 0x8000, 0x1, 0x20, 0x8, 0x4]}}, 0x5c) socket$l2tp6(0xa, 0x2, 0x73) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x200000000}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x6}, {0xa, 0x4e24, 0x7, @private2, 0x5}, 0xffffffffffffffff, {[0x8, 0x2, 0x9, 0x8000, 0x1, 0x20, 0x8, 0x4]}}, 0x5c) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x200000000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) (async) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) kexec_load(0xfffffffffffffffd, 0x6, &(0x7f0000000380)=[{&(0x7f0000000040)="c3efe0a2a373a828b79948111873747e8209b7e6fe2572ea9f", 0x19, 0x0, 0x5}, {&(0x7f00000006c0)="1fcfb89cff98cf8b6588c0adcf4c05d043dee05ca25f7b2166aed494c1330a0d1cd01fdc20c8546892916ed0c8c7c29dd5fb8decc80b4973b062616320a0fb54eea8cb4f0995ea5e050bf989a0ee29269791", 0x52, 0x9, 0x3}, {&(0x7f00000000c0)="8d6c53", 0x3, 0x6}, {&(0x7f0000000100)="20099e503caddf78120767394d7d799880c4509d789765dab81f1994be2ff74fb77f5ed7e2599af1e2842d03d84217937c0ad09a9f4900a6755e74303685daa345502bf984e1c122ee4f0f3f2f02a3a0ea55a3cf3a2218afc5f0d9b94311d938d449d6216156261822f9651924cb9f692fa4415789c34b7263c92130", 0x7c, 0x7fffffffffffffff, 0x3}, {&(0x7f0000000180)="50046d134ebeaf52e432cfb4418630fc158b91b903f7cf71338e29df2b78eef21b7d16503de0c4969c5105574a52ece7600fbc1394727773d0a0858369c330", 0x3f, 0x101, 0xb35}, {&(0x7f0000000280)="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", 0xfd, 0x2, 0x7522}], 0x140000) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000080)={0x20, 0x3fa, 0x2, 0x70bd2c, 0x25dfdbfd, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4040045}, 0x2dc7d5050151e3cb) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8582824}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x20, 0x3fa, 0x10, 0x16, 0x25dfdbff, {0x1, 0x0, 0x0, 0x1}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) kexec_load(0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000440)="98fe0e78a752c4a0d729a381ebefdd1b343ad5f8f33d6c4499fbcd2d56df825a6a785887b1e37c9d5b82492ac67ce39a911810aeb9417108024eb8d209895d239e60a02f59c9b39c4c5d05eb2246b4ea68dc1b78590ba9fd22c5e98cd45cda72e335dd0a5aa2c98b2cb05519d80c827c53315d369000f8744fe735d78f72a182fecce2545475fcfdf2d15aba30b20a94448e5c20606cc4f51e660ffc35a46406e7b77b2979cd11388fc4001b80e1489d15e3c00c943b29426853fefa444c3edb4116911e33f10a38e76c2bc44c96e980971ce9651fff25af8bb865d5a2858ad907e38b86c63771", 0xe7, 0x4, 0x4}, {&(0x7f0000000540)="d1cbcd5078646f3f54b12456fc8c3cc1ec46cb3e3abc9a9ba499c440b9e55f87f029f6bea301809bc040d2f146286e20213507b05001b7116f9ecedc62eb1e9a13ab84eefe00e84451ab77569be82c8ec79157725db6dddcac406c2269bf327d39678d71e02f70814324855e9a911d0254377eefd110091d12baf15ea775aaa39258f4678f7b0c8fb435287810aec5f7", 0x90, 0x1, 0xa07}], 0x80000) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) kexec_load(0xfffffffffffffffd, 0x6, &(0x7f0000000380)=[{&(0x7f0000000040)="c3efe0a2a373a828b79948111873747e8209b7e6fe2572ea9f", 0x19, 0x0, 0x5}, {&(0x7f00000006c0)="1fcfb89cff98cf8b6588c0adcf4c05d043dee05ca25f7b2166aed494c1330a0d1cd01fdc20c8546892916ed0c8c7c29dd5fb8decc80b4973b062616320a0fb54eea8cb4f0995ea5e050bf989a0ee29269791", 0x52, 0x9, 0x3}, {&(0x7f00000000c0)="8d6c53", 0x3, 0x6}, {&(0x7f0000000100)="20099e503caddf78120767394d7d799880c4509d789765dab81f1994be2ff74fb77f5ed7e2599af1e2842d03d84217937c0ad09a9f4900a6755e74303685daa345502bf984e1c122ee4f0f3f2f02a3a0ea55a3cf3a2218afc5f0d9b94311d938d449d6216156261822f9651924cb9f692fa4415789c34b7263c92130", 0x7c, 0x7fffffffffffffff, 0x3}, {&(0x7f0000000180)="50046d134ebeaf52e432cfb4418630fc158b91b903f7cf71338e29df2b78eef21b7d16503de0c4969c5105574a52ece7600fbc1394727773d0a0858369c330", 0x3f, 0x101, 0xb35}, {&(0x7f0000000280)="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", 0xfd, 0x2, 0x7522}], 0x140000) (async) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000080)={0x20, 0x3fa, 0x2, 0x70bd2c, 0x25dfdbfd, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4040045}, 0x2dc7d5050151e3cb) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8582824}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x20, 0x3fa, 0x10, 0x16, 0x25dfdbff, {0x1, 0x0, 0x0, 0x1}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) (async) kexec_load(0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000440)="98fe0e78a752c4a0d729a381ebefdd1b343ad5f8f33d6c4499fbcd2d56df825a6a785887b1e37c9d5b82492ac67ce39a911810aeb9417108024eb8d209895d239e60a02f59c9b39c4c5d05eb2246b4ea68dc1b78590ba9fd22c5e98cd45cda72e335dd0a5aa2c98b2cb05519d80c827c53315d369000f8744fe735d78f72a182fecce2545475fcfdf2d15aba30b20a94448e5c20606cc4f51e660ffc35a46406e7b77b2979cd11388fc4001b80e1489d15e3c00c943b29426853fefa444c3edb4116911e33f10a38e76c2bc44c96e980971ce9651fff25af8bb865d5a2858ad907e38b86c63771", 0xe7, 0x4, 0x4}, {&(0x7f0000000540)="d1cbcd5078646f3f54b12456fc8c3cc1ec46cb3e3abc9a9ba499c440b9e55f87f029f6bea301809bc040d2f146286e20213507b05001b7116f9ecedc62eb1e9a13ab84eefe00e84451ab77569be82c8ec79157725db6dddcac406c2269bf327d39678d71e02f70814324855e9a911d0254377eefd110091d12baf15ea775aaa39258f4678f7b0c8fb435287810aec5f7", 0x90, 0x1, 0xa07}], 0x80000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) [ 2300.391279][T24348] tipc: Enabling of bearer rejected, failed to enable media [ 2300.411930][T24346] tipc: Enabling of bearer rejected, already enabled 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x6}, {0xa, 0x4e24, 0x7, @private2, 0x5}, 0xffffffffffffffff, {[0x8, 0x2, 0x9, 0x8000, 0x1, 0x20, 0x8, 0x4]}}, 0x5c) (async, rerun: 64) socket$l2tp6(0xa, 0x2, 0x73) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x200000000}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) [ 2300.433486][T24346] tipc: Enabling of bearer rejected, failed to enable media 07:48:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x2000, 0x0}}, 0xfffffdef) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x7fffffff, "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", 0x5f, 0x64, 0x1, 0x0, 0xe1, 0x1, 0x3f, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) 07:48:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) setsockopt$MRT6_TABLE(r3, 0x29, 0xcf, &(0x7f0000000040)=0xfc, 0x4) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0xffffffffffffffd4, 0xfa00, {0x2000000000002, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) sendmsg$802154_dgram(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0302}}}, 0x14, &(0x7f00000001c0)={&(0x7f0000000280)="6349f6c367d62df58af0594e6084d5bbb30c95bdb6aebe3903159ce8bf533f55272cdbe4c287c90d4d5f92d4162f4f78b542416bdb4cb30e01d6b95190261bd25c0681d15d737310a762108cf1f1a425bb8f2c161d3430782ec6d01c2553a31e9cd9bfd290c0d87f4c010a8953b92afbbabbdd3704ee701717646f014ee57e340c86086c798efa2cf9", 0x89}, 0x1, 0x0, 0x0, 0x20000080}, 0x20008190) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, {0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, '\x00', 0x10}, 0x7ff}, r4, 0x2}}, 0x48) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) kexec_load(0xfffffffffffffffd, 0x6, &(0x7f0000000380)=[{&(0x7f0000000040)="c3efe0a2a373a828b79948111873747e8209b7e6fe2572ea9f", 0x19, 0x0, 0x5}, {&(0x7f00000006c0)="1fcfb89cff98cf8b6588c0adcf4c05d043dee05ca25f7b2166aed494c1330a0d1cd01fdc20c8546892916ed0c8c7c29dd5fb8decc80b4973b062616320a0fb54eea8cb4f0995ea5e050bf989a0ee29269791", 0x52, 0x9, 0x3}, {&(0x7f00000000c0)="8d6c53", 0x3, 0x6}, {&(0x7f0000000100)="20099e503caddf78120767394d7d799880c4509d789765dab81f1994be2ff74fb77f5ed7e2599af1e2842d03d84217937c0ad09a9f4900a6755e74303685daa345502bf984e1c122ee4f0f3f2f02a3a0ea55a3cf3a2218afc5f0d9b94311d938d449d6216156261822f9651924cb9f692fa4415789c34b7263c92130", 0x7c, 0x7fffffffffffffff, 0x3}, {&(0x7f0000000180)="50046d134ebeaf52e432cfb4418630fc158b91b903f7cf71338e29df2b78eef21b7d16503de0c4969c5105574a52ece7600fbc1394727773d0a0858369c330", 0x3f, 0x101, 0xb35}, {&(0x7f0000000280)="ae80a8b91b44d5d95e879a18df610edfd8c65e17167cd435e61e9a3c53dd3299771b0696c5670cfa4cd165894a9b37bf5c7be90cecb1816303df0e9f042c48a370cec1a5a1eb98310e346e7bd21197996e6bae9052d465fcf81f1d5867425af478bbc41fb0efe6ff6809b62f3ea5055df05850d8b0904c7a88cfd49dda1e56ce56b37afbb7667087f1f90a1d2313c23bbfb7cc05a31ada5c58cfb0fa53acd7f35c9381de8bea042b9a051b0640421db448968b5eeb7fb0ef875c66dcf2f571fc540c269ec768a85774111bc39151a0457aaef85fae98e1ed2b3593597ef9f0ff05db590f2189c0934bfcc68e9480c164963bd9cd6116ad3567547343f9", 0xfd, 0x2, 0x7522}], 0x140000) (async) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000080)={0x20, 0x3fa, 0x2, 0x70bd2c, 0x25dfdbfd, {0x1, 0x0, 0x0, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4040045}, 0x2dc7d5050151e3cb) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8582824}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x20, 0x3fa, 0x10, 0x16, 0x25dfdbff, {0x1, 0x0, 0x0, 0x1}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) (async) kexec_load(0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000440)="98fe0e78a752c4a0d729a381ebefdd1b343ad5f8f33d6c4499fbcd2d56df825a6a785887b1e37c9d5b82492ac67ce39a911810aeb9417108024eb8d209895d239e60a02f59c9b39c4c5d05eb2246b4ea68dc1b78590ba9fd22c5e98cd45cda72e335dd0a5aa2c98b2cb05519d80c827c53315d369000f8744fe735d78f72a182fecce2545475fcfdf2d15aba30b20a94448e5c20606cc4f51e660ffc35a46406e7b77b2979cd11388fc4001b80e1489d15e3c00c943b29426853fefa444c3edb4116911e33f10a38e76c2bc44c96e980971ce9651fff25af8bb865d5a2858ad907e38b86c63771", 0xe7, 0x4, 0x4}, {&(0x7f0000000540)="d1cbcd5078646f3f54b12456fc8c3cc1ec46cb3e3abc9a9ba499c440b9e55f87f029f6bea301809bc040d2f146286e20213507b05001b7116f9ecedc62eb1e9a13ab84eefe00e84451ab77569be82c8ec79157725db6dddcac406c2269bf327d39678d71e02f70814324855e9a911d0254377eefd110091d12baf15ea775aaa39258f4678f7b0c8fb435287810aec5f7", 0x90, 0x1, 0xa07}], 0x80000) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700200000000000006574683a6970366772653000"], 0x34}}, 0x0) socketpair(0x3f, 0xa, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0xc, 0x13, @l2={'eth', 0x3a, '\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20008040) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x24040001}, 0x8005) write$nci(0xffffffffffffffff, &(0x7f0000000040)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x6, {0x1, 0xe4, 0xff, 0x0, 0x40, 0x3, 0xf, 0xff, 0xec, "9d521f31db4b334343b2a665f396fddbeb5e66f0b8d66041d9d1b6282ca68590724d4055089ce7da2a1672a90c4c3b27c9e20b781698f870b5958316af828f4a4ba9d84a5739e814ce6333739c83e9551c089efaa180d4734bcca3ae0e4a48633f5c82b891cd224b2496cb8b5527d404dea0f1059f96d2a6f4380e34416f623be9b84bbd9af99941970314c5b77ce9cdca760949b50e158712f4e4086a074f7958d8d377220c3e056d6db3e7d81ae88a816dd1fc318de358ac9840bddc89bbb526985879dff4707b74007b930c558a99ba7e0d0dd1cec64b9108238a671f11d6ffd5cbdc9a576dc95074b452"}}, 0xfd) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700200000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) socketpair(0x3f, 0xa, 0x40, &(0x7f0000000140)) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0xc, 0x13, @l2={'eth', 0x3a, '\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20008040) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x24040001}, 0x8005) (async) write$nci(0xffffffffffffffff, &(0x7f0000000040)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x6, {0x1, 0xe4, 0xff, 0x0, 0x40, 0x3, 0xf, 0xff, 0xec, "9d521f31db4b334343b2a665f396fddbeb5e66f0b8d66041d9d1b6282ca68590724d4055089ce7da2a1672a90c4c3b27c9e20b781698f870b5958316af828f4a4ba9d84a5739e814ce6333739c83e9551c089efaa180d4734bcca3ae0e4a48633f5c82b891cd224b2496cb8b5527d404dea0f1059f96d2a6f4380e34416f623be9b84bbd9af99941970314c5b77ce9cdca760949b50e158712f4e4086a074f7958d8d377220c3e056d6db3e7d81ae88a816dd1fc318de358ac9840bddc89bbb526985879dff4707b74007b930c558a99ba7e0d0dd1cec64b9108238a671f11d6ffd5cbdc9a576dc95074b452"}}, 0xfd) (async) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x7fffffff, "33e646c081aa0c4a5f9a6753c619f9438616a364fcb5ccba6c514d1e8277a9078d41019ba06315edc3e23861429641ce987ebe0518d615637d63d1cf644659adcf4e6bbaaf9fe192c5cef2515c01625e57141d8ea0067a1876ed6f66a17993b57140c0ccd1006daaaf9de3489ed0a2352c168285eb5b49e71600354140f3adda7d26df183c52b50258b81b8a01aa339bd530915d88424f0b8d34b8d311fd0139732801e98e648f66998c01909cfafe43a477ce3e860fca9d2a14fa6d2b3eb8b2fd7a58b167d0229515e7550a4c5dcaa69431da0cce245592c8fe37d3fee8a6f29e8ed2a352ec29dd5c270ca0b240aef41cd9b503bad631cd3241b80ad48c0f0d", 0x5f, 0x64, 0x1, 0x0, 0xe1, 0x1, 0x3f, 0x1}}}, 0x128) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) [ 2300.560708][T24382] tipc: Enabling of bearer rejected, already enabled [ 2300.572418][T24384] tipc: Enabling of bearer rejected, failed to enable media [ 2300.592356][T24382] tipc: Enabling of bearer rejected, failed to enable media 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async, rerun: 32) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700200000000000006574683a6970366772653000"], 0x34}}, 0x0) (rerun: 32) socketpair(0x3f, 0xa, 0x40, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 32) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0xc, 0x13, @l2={'eth', 0x3a, '\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20008040) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x24040001}, 0x8005) (async, rerun: 64) write$nci(0xffffffffffffffff, &(0x7f0000000040)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x6, {0x1, 0xe4, 0xff, 0x0, 0x40, 0x3, 0xf, 0xff, 0xec, "9d521f31db4b334343b2a665f396fddbeb5e66f0b8d66041d9d1b6282ca68590724d4055089ce7da2a1672a90c4c3b27c9e20b781698f870b5958316af828f4a4ba9d84a5739e814ce6333739c83e9551c089efaa180d4734bcca3ae0e4a48633f5c82b891cd224b2496cb8b5527d404dea0f1059f96d2a6f4380e34416f623be9b84bbd9af99941970314c5b77ce9cdca760949b50e158712f4e4086a074f7958d8d377220c3e056d6db3e7d81ae88a816dd1fc318de358ac9840bddc89bbb526985879dff4707b74007b930c558a99ba7e0d0dd1cec64b9108238a671f11d6ffd5cbdc9a576dc95074b452"}}, 0xfd) (rerun: 64) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x7fffffff, "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", 0x5f, 0x64, 0x1, 0x0, 0xe1, 0x1, 0x3f, 0x1}}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) [ 2300.611489][T24396] tipc: Enabling of bearer rejected, failed to enable media [ 2300.620485][T24404] tipc: Enabling of bearer rejected, failed to enable media [ 2300.657079][T24407] tipc: Enabling of bearer rejected, already enabled [ 2300.675027][T24407] tipc: Enabling of bearer rejected, already enabled [ 2300.692507][T24407] tipc: Enabling of bearer rejected, already enabled [ 2300.711980][T24414] tipc: Enabling of bearer rejected, failed to enable media [ 2300.731367][T24407] tipc: Enabling of bearer rejected, already enabled 07:48:45 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x8008, 0x0}}, 0xfffffdef) 07:48:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0xfffffffeffffffff, {0xa, 0x4e23, 0x3957, @local, 0x10000}, r3}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) setsockopt$MRT6_TABLE(r3, 0x29, 0xcf, &(0x7f0000000040)=0xfc, 0x4) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0xffffffffffffffd4, 0xfa00, {0x2000000000002, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) sendmsg$802154_dgram(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0302}}}, 0x14, &(0x7f00000001c0)={&(0x7f0000000280)="6349f6c367d62df58af0594e6084d5bbb30c95bdb6aebe3903159ce8bf533f55272cdbe4c287c90d4d5f92d4162f4f78b542416bdb4cb30e01d6b95190261bd25c0681d15d737310a762108cf1f1a425bb8f2c161d3430782ec6d01c2553a31e9cd9bfd290c0d87f4c010a8953b92afbbabbdd3704ee701717646f014ee57e340c86086c798efa2cf9", 0x89}, 0x1, 0x0, 0x0, 0x20000080}, 0x20008190) (async) sendmsg$802154_dgram(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0302}}}, 0x14, &(0x7f00000001c0)={&(0x7f0000000280)="6349f6c367d62df58af0594e6084d5bbb30c95bdb6aebe3903159ce8bf533f55272cdbe4c287c90d4d5f92d4162f4f78b542416bdb4cb30e01d6b95190261bd25c0681d15d737310a762108cf1f1a425bb8f2c161d3430782ec6d01c2553a31e9cd9bfd290c0d87f4c010a8953b92afbbabbdd3704ee701717646f014ee57e340c86086c798efa2cf9", 0x89}, 0x1, 0x0, 0x0, 0x20000080}, 0x20008190) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, {0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, '\x00', 0x10}, 0x7ff}, r4, 0x2}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, {0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, '\x00', 0x10}, 0x7ff}, r4, 0x2}}, 0x48) 07:48:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) 07:48:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="28280d8469631e6594f25086e0e0ca89762b90db426d831e72bf714c18a97ded16d5ca898db6110e484891df76706594baa59e22b0275309f8103200c3d3a822f329f2145179f45127892035e7eea9beaa24999c601a374c89f3ae9aaf0ca881ae30f5009bdb1bf78499d80c27bb3debf397333b0e344a3b1a6e217e7999d5f5a497c5c0a4ba", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x1, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0xfffffffeffffffff, {0xa, 0x4e23, 0x3957, @local, 0x10000}, r3}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="28280d8469631e6594f25086e0e0ca89762b90db426d831e72bf714c18a97ded16d5ca898db6110e484891df76706594baa59e22b0275309f8103200c3d3a822f329f2145179f45127892035e7eea9beaa24999c601a374c89f3ae9aaf0ca881ae30f5009bdb1bf78499d80c27bb3debf397333b0e344a3b1a6e217e7999d5f5a497c5c0a4ba", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2300.802746][T24419] tipc: Enabling of bearer rejected, failed to enable media [ 2300.823356][T24426] tipc: Enabling of bearer rejected, failed to enable media 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="28280d8469631e6594f25086e0e0ca89762b90db426d831e72bf714c18a97ded16d5ca898db6110e484891df76706594baa59e22b0275309f8103200c3d3a822f329f2145179f45127892035e7eea9beaa24999c601a374c89f3ae9aaf0ca881ae30f5009bdb1bf78499d80c27bb3debf397333b0e344a3b1a6e217e7999d5f5a497c5c0a4ba", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0xfffffffeffffffff, {0xa, 0x4e23, 0x3957, @local, 0x10000}, r3}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0xfffffffeffffffff, {0xa, 0x4e23, 0x3957, @local, 0x10000}, r3}}, 0x38) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) [ 2300.851015][T24436] tipc: Enabling of bearer rejected, failed to enable media [ 2300.868420][T24439] tipc: Enabling of bearer rejected, failed to enable media [ 2300.891376][T24436] tipc: Enabling of bearer rejected, failed to enable media 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x6, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$MRT6_PIM(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) socket$inet6_sctp(0xa, 0x5, 0x84) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r4, 0x3f}}, 0x10) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) setsockopt$MRT6_TABLE(r3, 0x29, 0xcf, &(0x7f0000000040)=0xfc, 0x4) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0xffffffffffffffd4, 0xfa00, {0x2000000000002, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) sendmsg$802154_dgram(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0302}}}, 0x14, &(0x7f00000001c0)={&(0x7f0000000280)="6349f6c367d62df58af0594e6084d5bbb30c95bdb6aebe3903159ce8bf533f55272cdbe4c287c90d4d5f92d4162f4f78b542416bdb4cb30e01d6b95190261bd25c0681d15d737310a762108cf1f1a425bb8f2c161d3430782ec6d01c2553a31e9cd9bfd290c0d87f4c010a8953b92afbbabbdd3704ee701717646f014ee57e340c86086c798efa2cf9", 0x89}, 0x1, 0x0, 0x0, 0x20000080}, 0x20008190) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, {0xa, 0x4e23, 0x10000, @dev={0xfe, 0x80, '\x00', 0x10}, 0x7ff}, r4, 0x2}}, 0x48) 07:48:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xff01, 0x0}}, 0xfffffdef) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$MRT6_PIM(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) socket$inet6_sctp(0xa, 0x5, 0x84) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) setsockopt$MRT6_PIM(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) 07:48:46 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r4, 0x3f}}, 0x10) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$MRT6_PIM(r0, 0x29, 0xcf, &(0x7f0000000000)=0x1, 0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) socket$inet6_sctp(0xa, 0x5, 0x84) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r4, 0x3f}}, 0x10) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x6, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) [ 2301.025744][T24464] tipc: Bearer : already 2 bearers with priority 0 [ 2301.033301][T24464] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x66e081, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x66e081, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:46 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2301.099802][T24486] tipc: Bearer : already 2 bearers with priority 0 [ 2301.107206][T24486] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x54b4cbfd3125440a, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000001c0)={0x4, 0xfffffffffffffdbd}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$qrtrtun(r0, &(0x7f00000003c0)=""/241, 0xf1) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x31d, "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", 0x19, 0x1, 0x8, 0x1, 0x6, 0xe7, 0x5}, r4}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x66e081, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x100000, 0x0}}, 0xfffffdef) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x6, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x6, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) (async) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x54b4cbfd3125440a, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async, rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000001c0)={0x4, 0xfffffffffffffdbd}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$qrtrtun(r0, &(0x7f00000003c0)=""/241, 0xf1) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x31d, "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", 0x19, 0x1, 0x8, 0x1, 0x6, 0xe7, 0x5}, r4}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair(0xf, 0x80000, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x3fa, 0x2, 0x70bd26, 0x25dfdbfe, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vxcan1\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x9, 0x1, "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", 0x9, 0xff, 0x40, 0x6, 0x2, 0x6, 0x8, 0x1}, r7}}, 0x128) 07:48:46 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "15250f", "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"}}, 0x110) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x54b4cbfd3125440a, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000001c0)={0x4, 0xfffffffffffffdbd}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$qrtrtun(r0, &(0x7f00000003c0)=""/241, 0xf1) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x31d, "23769b876b986db735ad86c5c5f15d6b776a4daed4fdcae8511733b35700aa96f877a2b20fe27f163f87d3dfcd14063e2fbba407949c66b75c7a878eb7c2293a39c2141d8671232a17ee8d6a4e928d36b33b1a00ea13e351affac3467903394698c395a00bbf40e6b7bce7915690f5a2b98fc03c4b72858295e7ddce5925ed8eaf7b8bdcf88be8e9b019dbdb7e7425aa85ea60a94e97d3007391abade00c715eebc1dbb1e9786536eff57ade03c9598b558f702efdc038fa6437ff3e1a683effce639967df0500218e80982886874447a7da447b515bbe1bfee53ce2ba5d96a9e0907c9cbca450820fbde24cc7dd2fc8178377319e0b3ec6d83f1f07fc0eb07d", 0x19, 0x1, 0x8, 0x1, 0x6, 0xe7, 0x5}, r4}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) 07:48:46 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair(0xf, 0x80000, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x3fa, 0x2, 0x70bd26, 0x25dfdbfe, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vxcan1\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x9, 0x1, "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", 0x9, 0xff, 0x40, 0x6, 0x2, 0x6, 0x8, 0x1}, r7}}, 0x128) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) socketpair(0xf, 0x80000, 0x0, &(0x7f0000000040)) (async) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x3fa, 0x2, 0x70bd26, 0x25dfdbfe, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vxcan1\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x9, 0x1, "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", 0x9, 0xff, 0x40, 0x6, 0x2, 0x6, 0x8, 0x1}, r7}}, 0x128) (async) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "15250f", "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"}}, 0x110) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x3}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) [ 2301.256197][T24501] tipc: Bearer : already 2 bearers with priority 0 [ 2301.263634][T24501] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x32, &(0x7f0000000000)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x24040010) [ 2301.344813][T24536] tipc: Enabling of bearer rejected, already enabled 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x3}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x3}}, 0x20) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) 07:48:46 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) socketpair(0xf, 0x80000, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x3fa, 0x2, 0x70bd26, 0x25dfdbfe, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vxcan1\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x9, 0x1, "3c541346c8a377fca10ab11d9e4a2fb5bffd6377fccfa70793c7e67b8dcd64460beb9f0e52589d806edc109da62b5a382407e4ca9021fad3ae6c9cc9e91dcff7a9ad239561155b47433de8cceb6141b61b92273aebbf66b1617cdb3c041e765df4eedb9eed2a3ded206d9379c7fcd8ebd12473fbcba4b294eb39cda5ea0523bbeae5f810b78910113fffb7d8d0076b6d9f530cd492e3bb59c88639dc39e6e9112bf74aae959877cf15bd174cbd1b055407cfe8e280beed844fe00f6ec36bbcdcc465302fe2b91eed153a1cf3f87d569f0cf402f05f32d207150f55560c63ca072f2693e1f1e5d44a1d25586c01eb09279a174b969a739ac482bd64c6bc116635", 0x9, 0xff, 0x40, 0x6, 0x2, 0x6, 0x8, 0x1}, r7}}, 0x128) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "15250f", "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"}}, 0x110) (rerun: 64) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x32, &(0x7f0000000000)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x24040010) 07:48:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x1000000, 0x0}}, 0xfffffdef) 07:48:46 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x400}}, 0x10) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x40, "030062", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be3008deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f2f4a3c36bc1878fc3edffffffa8345ebe1eea66d52d39b9c9f7415c69cc53f87dbf2d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248585d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782718c89f1975cc4db6d295d74b7b7324c2808343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e0100"}}, 0x110) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x3}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106, 0x3}}, 0x20) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x32, &(0x7f0000000000)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x24040010) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x40, "030062", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be3008deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f2f4a3c36bc1878fc3edffffffa8345ebe1eea66d52d39b9c9f7415c69cc53f87dbf2d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248585d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782718c89f1975cc4db6d295d74b7b7324c2808343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e0100"}}, 0x110) [ 2301.434860][T24541] tipc: Enabling of bearer rejected, already enabled 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x40, "030062", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be3008deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f2f4a3c36bc1878fc3edffffffa8345ebe1eea66d52d39b9c9f7415c69cc53f87dbf2d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248585d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782718c89f1975cc4db6d295d74b7b7324c2808343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e0100"}}, 0x110) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x1, {0xffffff8f, 0x20, "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", 0x6, 0x6, 0x40, 0xd7, 0x20, 0x1e, 0x8, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @mcast1, 0x5f}, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x19}, 0x20}, 0xffffffffffffffff, 0x15f2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:46 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x400}}, 0x10) 07:48:46 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/mwifiex_usb', 0x4940, 0x140) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x7f}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) [ 2301.484095][T24564] tipc: Enabling of bearer rejected, already enabled 07:48:46 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x400}}, 0x10) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200840, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r6, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={r5, 0x1, r6, 0x100, 0x80000}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r8, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r8, &(0x7f0000000100)=r9, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={r10, 0x469d, 0x800}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r11, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)=0x4, 0x4) sendmsg$TIPC_CMD_GET_MAX_PORTS(r11, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x8804) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r7, 0x40082102, &(0x7f0000000240)=r10) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ip_set', 0x80002, 0x1b3) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r13, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r12, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x53dd6eef819297de, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r13}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4, 0x1, {0x2, 0xff}}, 0x18) 07:48:46 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/mwifiex_usb', 0x4940, 0x140) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/mwifiex_usb', 0x4940, 0x140) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x7f}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x7f}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:46 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x2000000, 0x0}}, 0xfffffdef) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/mwifiex_usb', 0x4940, 0x140) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x7f}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200840, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r6, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={r5, 0x1, r6, 0x100, 0x80000}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r8, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r8, &(0x7f0000000100)=r9, 0x12) (async) write$cgroup_pid(r8, &(0x7f0000000100)=r9, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={r10, 0x469d, 0x800}) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r11, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)=0x4, 0x4) (async) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)=0x4, 0x4) sendmsg$TIPC_CMD_GET_MAX_PORTS(r11, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x8804) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r11, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x8804) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r7, 0x40082102, &(0x7f0000000240)=r10) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r7, 0x40082102, &(0x7f0000000240)=r10) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ip_set', 0x80002, 0x1b3) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r13, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r13, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r12, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x53dd6eef819297de, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r13}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r12, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x53dd6eef819297de, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r13}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4, 0x1, {0x2, 0xff}}, 0x18) (async) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4, 0x1, {0x2, 0xff}}, 0x18) 07:48:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x1, {0xffffff8f, 0x20, "0ecb351e35baaeac0f05749886da020c72bfb35b8dcb735ece1d93499a48bf730950834bc5ee580926286f01361216c486034bf32ed08224318d8accdd3bdb3670f4482c44be6e1ab3158eb3bdcf85a995ac10c7a5f69e5a7ebc60d68dc1f54e710019a87bce66e12dfa43de8fe550bf2f828ed8cdc2c4f959c5ee3ea89c4c2d05ea3fbc1622ece36599d82639163a4240b2a69413321cf8368be90c65c0e2af444fd8d8bccde9407a4c358c9c750e51c12cd8f46243fc4fc6a0d5aa7f64c95a2a817225c794823bcab6537c1123129b8cb2b6d72f9a3d08b529e46523b5d50e45faef4a898fc63f1bcd6351b321b1da71a889a6e2f57601788e017316112297", 0x6, 0x6, 0x40, 0xd7, 0x20, 0x1e, 0x8, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @mcast1, 0x5f}, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x19}, 0x20}, 0xffffffffffffffff, 0x15f2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x1, {0xffffff8f, 0x20, "0ecb351e35baaeac0f05749886da020c72bfb35b8dcb735ece1d93499a48bf730950834bc5ee580926286f01361216c486034bf32ed08224318d8accdd3bdb3670f4482c44be6e1ab3158eb3bdcf85a995ac10c7a5f69e5a7ebc60d68dc1f54e710019a87bce66e12dfa43de8fe550bf2f828ed8cdc2c4f959c5ee3ea89c4c2d05ea3fbc1622ece36599d82639163a4240b2a69413321cf8368be90c65c0e2af444fd8d8bccde9407a4c358c9c750e51c12cd8f46243fc4fc6a0d5aa7f64c95a2a817225c794823bcab6537c1123129b8cb2b6d72f9a3d08b529e46523b5d50e45faef4a898fc63f1bcd6351b321b1da71a889a6e2f57601788e017316112297", 0x6, 0x6, 0x40, 0xd7, 0x20, 0x1e, 0x8, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @mcast1, 0x5f}, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x19}, 0x20}, 0xffffffffffffffff, 0x15f2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) 07:48:46 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, {0xa, 0x4e23, 0x81, @private0, 0xfffffff8}, r5, 0xffff}}, 0x48) 07:48:46 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "041a00", "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"}}, 0x110) 07:48:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async, rerun: 64) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x200840, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r2) (async, rerun: 32) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (rerun: 32) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) (async, rerun: 32) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) (async, rerun: 32) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r6, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={r5, 0x1, r6, 0x100, 0x80000}) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r7, 0x0, 0x1, 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r8, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r8, &(0x7f0000000100)=r9, 0x12) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={r10, 0x469d, 0x800}) (async) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r11, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000600)=0x4, 0x4) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r11, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x8804) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r7, 0x40082102, &(0x7f0000000240)=r10) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ip_set', 0x80002, 0x1b3) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r13, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r12, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x53dd6eef819297de, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r13}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) (async) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4, 0x1, {0x2, 0xff}}, 0x18) 07:48:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$cgroup_devices(r1, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @empty}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, {0xa, 0x4e23, 0x81, @private0, 0xfffffff8}, r5, 0xffff}}, 0x48) 07:48:47 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "041a00", "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"}}, 0x110) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000001000000000000000141000000180017000000006574683a697036677265300000000000"], 0x34}}, 0x0) 07:48:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x1, {0xffffff8f, 0x20, "0ecb351e35baaeac0f05749886da020c72bfb35b8dcb735ece1d93499a48bf730950834bc5ee580926286f01361216c486034bf32ed08224318d8accdd3bdb3670f4482c44be6e1ab3158eb3bdcf85a995ac10c7a5f69e5a7ebc60d68dc1f54e710019a87bce66e12dfa43de8fe550bf2f828ed8cdc2c4f959c5ee3ea89c4c2d05ea3fbc1622ece36599d82639163a4240b2a69413321cf8368be90c65c0e2af444fd8d8bccde9407a4c358c9c750e51c12cd8f46243fc4fc6a0d5aa7f64c95a2a817225c794823bcab6537c1123129b8cb2b6d72f9a3d08b529e46523b5d50e45faef4a898fc63f1bcd6351b321b1da71a889a6e2f57601788e017316112297", 0x6, 0x6, 0x40, 0xd7, 0x20, 0x1e, 0x8, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @mcast1, 0x5f}, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x19}, 0x20}, 0xffffffffffffffff, 0x15f2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x2040000, 0x0}}, 0xfffffdef) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$cgroup_devices(r1, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, {0xa, 0x4e23, 0x81, @private0, 0xfffffff8}, r5, 0xffff}}, 0x48) 07:48:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffce3) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000001000000000000000141000000180017000000006574683a697036677265300000000000"], 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000001000000000000000141000000180017000000006574683a697036677265300000000000"], 0x34}}, 0x0) (async) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1, "041a00", "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"}}, 0x110) 07:48:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffce3) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0501000000000000000001000000000000000141000000180017000000006574683a697036677265300000000000"], 0x34}}, 0x0) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1570c0", "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"}}, 0x165) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/hwmon', 0xd8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x100, 0x20, "851e5df12b9cc3e79d414d55659d27f75815c54ba635d1626594e215273db87f55e62195413e02d2085ffd3a39557b08a148cc3f682fbc3331554e5a8a5fb410afb89e6ed7fffb1d78ac04217ab80402d26ed64c006b141c76a42afcffdb61cb57b8d5247550e8da3fabe6a62db3637db59b9c41452aa47e268a68abb6ed0a23689c5cbb6a41462f88dab598e82a5346ed813033f16f1ede4a3ef1fc6d7050b4c366018ff2179fecdf3ee14237070979a6d0ff63c886cbb09ed55e0533717a7c52b32175ac041744477a3799dc13b869630aa7793657a2c96e4c7ce1cdc303f78e8551a112d55d8d28628b8b8c4ca8532281b78d888617c6b550ec4143a435a7", 0x81, 0x20, 0x5, 0x3, 0x5, 0x1, 0xa7, 0x1}, r2}}, 0x120) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010077000000de00000100000000000012014100000018001700000000000000006534683ad40b466eebc99bc8aede6f346508b7e918551a370cc00baa1b702f7c77d3a46dffc43ff2639ceee37eecc13e0e395b58d5a457423e0d82cfeeb4234c5c9e9ac24ded21ac06c903ef54cd45fb946adcf3ee95744b0d2b42f572234bbad497c0e26d0d72f26445f2245f4d7fce6ed249d6ba09049735aa8685691b3e1f212850bc30068aa4a4f253593c1b6f2a8e0ffbfe9d568d5f15a8bdacefd06f9b9d"], 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/btbcm', 0x103800, 0x0) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0x3f6, 0x8, 0x70bd25, 0x25dfdbfd, "", ["", ""]}, 0x10}}, 0x40) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1570c0", "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"}}, 0x165) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1570c0", "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"}}, 0x165) (async) 07:48:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffce3) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffffffffffce3) (async) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (rerun: 32) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010077000000de00000100000000000012014100000018001700000000000000006534683ad40b466eebc99bc8aede6f346508b7e918551a370cc00baa1b702f7c77d3a46dffc43ff2639ceee37eecc13e0e395b58d5a457423e0d82cfeeb4234c5c9e9ac24ded21ac06c903ef54cd45fb946adcf3ee95744b0d2b42f572234bbad497c0e26d0d72f26445f2245f4d7fce6ed249d6ba09049735aa8685691b3e1f212850bc30068aa4a4f253593c1b6f2a8e0ffbfe9d568d5f15a8bdacefd06f9b9d"], 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/btbcm', 0x103800, 0x0) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0x3f6, 0x8, 0x70bd25, 0x25dfdbfd, "", ["", ""]}, 0x10}}, 0x40) 07:48:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x4000000, 0x0}}, 0xfffffdef) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/hwmon', 0xd8000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x100, 0x20, "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", 0x81, 0x20, 0x5, 0x3, 0x5, 0x1, 0xa7, 0x1}, r2}}, 0x120) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/hwmon', 0xd8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x100, 0x20, "851e5df12b9cc3e79d414d55659d27f75815c54ba635d1626594e215273db87f55e62195413e02d2085ffd3a39557b08a148cc3f682fbc3331554e5a8a5fb410afb89e6ed7fffb1d78ac04217ab80402d26ed64c006b141c76a42afcffdb61cb57b8d5247550e8da3fabe6a62db3637db59b9c41452aa47e268a68abb6ed0a23689c5cbb6a41462f88dab598e82a5346ed813033f16f1ede4a3ef1fc6d7050b4c366018ff2179fecdf3ee14237070979a6d0ff63c886cbb09ed55e0533717a7c52b32175ac041744477a3799dc13b869630aa7793657a2c96e4c7ce1cdc303f78e8551a112d55d8d28628b8b8c4ca8532281b78d888617c6b550ec4143a435a7", 0x81, 0x20, 0x5, 0x3, 0x5, 0x1, 0xa7, 0x1}, r2}}, 0x120) 07:48:47 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x400, 0xc4, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1570c0", "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"}}, 0x165) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010077000000de00000100000000000012014100000018001700000000000000006534683ad40b466eebc99bc8aede6f346508b7e918551a370cc00baa1b702f7c77d3a46dffc43ff2639ceee37eecc13e0e395b58d5a457423e0d82cfeeb4234c5c9e9ac24ded21ac06c903ef54cd45fb946adcf3ee95744b0d2b42f572234bbad497c0e26d0d72f26445f2245f4d7fce6ed249d6ba09049735aa8685691b3e1f212850bc30068aa4a4f253593c1b6f2a8e0ffbfe9d568d5f15a8bdacefd06f9b9d"], 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/btbcm', 0x103800, 0x0) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x10, 0x3f6, 0x8, 0x70bd25, 0x25dfdbfd, "", ["", ""]}, 0x10}}, 0x40) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x3, 0x20, 0x99}, {0x0, 0x4, 0x42, 0x40}, {0x8, 0x5, 0xfb, 0xffff8a37}]}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = socket(0x1a, 0x6, 0x1000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x34}, 0x1, 0x0, 0x0, 0x4015}, 0x41) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x0, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x18, 0x17, {0x13, 0x231a999b, @l2={'ib', 0x3a, 'dvmrp1\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="02000000343e2b60a559b448771b7f8d0251495142187210dbe512269216dd675ef84d5b0561102f10eb50de454ada63c4f14ba3fb7f1b2d54973da426af41623e92d16617ae0c210a91bd7be5138d4d0f24c5681ca1584255e41fcf07ba3b0bd3e765452af1cab3e5d38abea0060f43ec1f49ad420df97ca1beb784f21f08e9f56bec2d7819afef48", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a697036b5f1653000"], 0x34}}, 0x0) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x800000000000001, 0x0, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x182, 0x9) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x10001, "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", 0x7, 0x9, 0x80, 0x9, 0x1f, 0x1, 0x4d, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x800000000000001, 0x0, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x182, 0x9) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x10001, "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", 0x7, 0x9, 0x80, 0x9, 0x1f, 0x1, 0x4d, 0x1}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r6}}, 0xc) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x3, 0x20, 0x99}, {0x0, 0x4, 0x42, 0x40}, {0x8, 0x5, 0xfb, 0xffff8a37}]}) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x3, 0x20, 0x99}, {0x0, 0x4, 0x42, 0x40}, {0x8, 0x5, 0xfb, 0xffff8a37}]}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000) (async) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = socket(0x1a, 0x6, 0x1000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x34}, 0x1, 0x0, 0x0, 0x4015}, 0x41) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x0, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x18, 0x17, {0x13, 0x231a999b, @l2={'ib', 0x3a, 'dvmrp1\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="02000000343e2b60a559b448771b7f8d0251495142187210dbe512269216dd675ef84d5b0561102f10eb50de454ada63c4f14ba3fb7f1b2d54973da426af41623e92d16617ae0c210a91bd7be5138d4d0f24c5681ca1584255e41fcf07ba3b0bd3e765452af1cab3e5d38abea0060f43ec1f49ad420df97ca1beb784f21f08e9f56bec2d7819afef48", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a697036b5f1653000"], 0x34}}, 0x0) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x400, 0xc4, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x5000000, 0x0}}, 0xfffffdef) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = socket(0x1a, 0x6, 0x1000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r4, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r4, 0x20, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x34}, 0x1, 0x0, 0x0, 0x4015}, 0x41) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r1, 0x0, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x18, 0x17, {0x13, 0x231a999b, @l2={'ib', 0x3a, 'dvmrp1\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x8004) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="02000000343e2b60a559b448771b7f8d0251495142187210dbe512269216dd675ef84d5b0561102f10eb50de454ada63c4f14ba3fb7f1b2d54973da426af41623e92d16617ae0c210a91bd7be5138d4d0f24c5681ca1584255e41fcf07ba3b0bd3e765452af1cab3e5d38abea0060f43ec1f49ad420df97ca1beb784f21f08e9f56bec2d7819afef48", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a697036b5f1653000"], 0x34}}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x3, 0x20, 0x99}, {0x0, 0x4, 0x42, 0x40}, {0x8, 0x5, 0xfb, 0xffff8a37}]}) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x3, 0x20, 0x99}, {0x0, 0x4, 0x42, 0x40}, {0x8, 0x5, 0xfb, 0xffff8a37}]}) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000000c0)) (async) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x800000000000001, 0x0, 0x13f, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x800000000000001, 0x0, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x182, 0x9) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x10001, "9dce3cba4afb12a100a0f84654d3b2c9281b918fe038b506a33c92412763586da7aa5ef1ece5882b60d65026a19ab12e2ea55f84750a4873e95dd33933c4e6cb0cf54206b9eca68acb5e76a4c841c6d1ba450336f0020f9b09d3e63459c227f1ced3c16c5d17f63aafbc65843233d7b3af59ec3bfe49bfb26ec57e7dd63cc9ce7cd2120b8929541b43aac766135c9d95e349ee82d45e993a59fb38c3ab0e0fc64357db65ed9e0499028400b83b11ffdd8e44177d7c18d96288ce0b61b5ab04906eb1643b781ac87f9474a87b4199419bbef821e9a48d8000081eabef50e073ec4db832e5dafd1e70f43440b26423c75dd2afbaba4e492ac3719f56732e5894a1", 0x7, 0x9, 0x80, 0x9, 0x1f, 0x1, 0x4d, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r6}}, 0xc) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r6}}, 0xc) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="2ee7c6e5fe1ffab1b0fb7304c4ec196718", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/bus/gbphy', 0x240, 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400c0}, 0x41) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="2ee7c6e5fe1ffab1b0fb7304c4ec196718", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/bus/gbphy', 0x240, 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400c0}, 0x41) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfc, '(2c', "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfc, '(2c', "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:47 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x400, 0xc4, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x4) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="2ee7c6e5fe1ffab1b0fb7304c4ec196718", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/bus/gbphy', 0x240, 0x3) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400c0}, 0x41) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="2ee7c6e5fe1ffab1b0fb7304c4ec196718", @ANYRES16=r1, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/bus/gbphy', 0x240, 0x3) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400c0}, 0x41) (async) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfc, '(2c', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xfc, '(2c', "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x3}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x7b1b65b9f8560ab2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x400000}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:47 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x6000000, 0x0}}, 0xfffffdef) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x3}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x7b1b65b9f8560ab2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x400000}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x70bd26, 0x2, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz1\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f6, 0x8, 0x70bd2d, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x332981a793704be1) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}}, 0x0) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (rerun: 32) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x3}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x7b1b65b9f8560ab2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}, 0x0, 0x0, 0x400000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2302.656783][T24785] tipc: Bearer : already 2 bearers with priority 0 [ 2302.664292][T24785] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/ip_vs', 0x0, 0x2) setsockopt$MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x20, @mcast1, 0x9}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, 0x1, {[0x5, 0x4, 0xfffffffe, 0x1ff, 0x9, 0x3, 0x9, 0x2d]}}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x10, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x51) 07:48:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x70bd26, 0x2, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz1\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f6, 0x8, 0x70bd2d, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x332981a793704be1) (async) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}}, 0x0) 07:48:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:47 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x6040000, 0x0}}, 0xfffffdef) 07:48:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/ip_vs', 0x0, 0x2) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/ip_vs', 0x0, 0x2) setsockopt$MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x20, @mcast1, 0x9}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, 0x1, {[0x5, 0x4, 0xfffffffe, 0x1ff, 0x9, 0x3, 0x9, 0x2d]}}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x10, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x51) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x0) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) 07:48:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x40000, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/ip_vs', 0x0, 0x2) setsockopt$MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x20, @mcast1, 0x9}, {0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, 0x1, {[0x5, 0x4, 0xfffffffe, 0x1ff, 0x9, 0x3, 0x9, 0x2d]}}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x10, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x51) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (rerun: 32) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x70bd26, 0x2, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz1\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f6, 0x8, 0x70bd2d, 0x25dfdbfb, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x332981a793704be1) (async) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", ""]}, 0x28}}, 0x0) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) 07:48:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socketpair(0x28, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000000)=0x4) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getroute={0x1c, 0x1a, 0x4, 0x70bd26, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x9, 0xfd, 0x4, 0xfd, 0x3, 0x200}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8880}, 0x20000001) 07:48:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}, {0xa, 0x4e23, 0x81, @private0, 0xfffffff8}, r5, 0xffff}}, 0x48) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) [ 2302.819920][T24801] tipc: Bearer : already 2 bearers with priority 0 [ 2302.827363][T24801] tipc: Enabling of bearer rejected, cannot adjust to lower [ 2302.848827][T24811] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x1, {0xffffff8f, 0x20, "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", 0x6, 0x6, 0x40, 0xd7, 0x20, 0x1e, 0x8, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @mcast1, 0x5f}, {0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x19}, 0x20}, 0xffffffffffffffff, 0x15f2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)="190a2d4a725cd8ad73bb", 0xa}}, 0x40000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x2, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r4) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00@\x00', @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x50000, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r3, 0x3, r4, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x20000001) 07:48:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x8000000, 0x0}}, 0xfffffdef) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)="190a2d4a725cd8ad73bb", 0xa}}, 0x40000) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x2, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r4) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00@\x00', @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00@\x00', @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x50000, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) (async) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r3, 0x3, r4, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040)=0x1, 0x4) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x20000001) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) [ 2303.055519][T24845] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x50000, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r3, 0x3, r4, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040)=0x1, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x20000001) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x50000, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) (async) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) (async) socket$can_j1939(0x1d, 0x2, 0x7) (async) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r3, 0x3, r4, 0x6}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000040)=0x1, 0x4) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x20000001) (async) 07:48:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) socketpair(0x28, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000000)=0x4) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getroute={0x1c, 0x1a, 0x4, 0x70bd26, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x9, 0xfd, 0x4, 0xfd, 0x3, 0x200}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8880}, 0x20000001) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)="190a2d4a725cd8ad73bb", 0xa}}, 0x40000) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x2, 0x70bd28, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r4) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00@\x00', @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) [ 2303.112167][T24856] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xc03, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) kexec_load(0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000180)="9aa50fcd2eb29ecbcd1544636c94be256d3ad5663a1b0ea6a4dc9fa6ccb57b923657ab07e592991c4679c0f1bd0b9367df49", 0x32, 0x8, 0x100000000}, {&(0x7f0000000280)="c1389448b747cb8a271b8a2485889c38a563bd36f73e85869348d49fd9ce41cb986989a4206b138d2cb9afa33642c35f2f64092e3e756132fcd574fafb532c0c2705d61f41ef8cf22684131c13d79be2766354d09d5263097a790bab363a72aca85d2e4385d05bd7fe5b4517fdf6b57b3067352993ae5aa776929c85414519534b58bac160b19af278c0b0", 0x8b, 0x44, 0x1}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f0000000000)={0x1, 0x1, 0x2, r2, 0x80000000}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6e}, {0xa, 0x4e22, 0x8, @empty, 0x2}, 0xffffffffffffffff, 0x3}}, 0x48) 07:48:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x8100000, 0x0}}, 0xfffffdef) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) kexec_load(0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000180)="9aa50fcd2eb29ecbcd1544636c94be256d3ad5663a1b0ea6a4dc9fa6ccb57b923657ab07e592991c4679c0f1bd0b9367df49", 0x32, 0x8, 0x100000000}, {&(0x7f0000000280)="c1389448b747cb8a271b8a2485889c38a563bd36f73e85869348d49fd9ce41cb986989a4206b138d2cb9afa33642c35f2f64092e3e756132fcd574fafb532c0c2705d61f41ef8cf22684131c13d79be2766354d09d5263097a790bab363a72aca85d2e4385d05bd7fe5b4517fdf6b57b3067352993ae5aa776929c85414519534b58bac160b19af278c0b0", 0x8b, 0x44, 0x1}], 0x1) (async, rerun: 32) r1 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f0000000000)={0x1, 0x1, 0x2, r2, 0x80000000}, 0xc) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6e}, {0xa, 0x4e22, 0x8, @empty, 0x2}, 0xffffffffffffffff, 0x3}}, 0x48) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xc03, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xc03, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) kexec_load(0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000180)="9aa50fcd2eb29ecbcd1544636c94be256d3ad5663a1b0ea6a4dc9fa6ccb57b923657ab07e592991c4679c0f1bd0b9367df49", 0x32, 0x8, 0x100000000}, {&(0x7f0000000280)="c1389448b747cb8a271b8a2485889c38a563bd36f73e85869348d49fd9ce41cb986989a4206b138d2cb9afa33642c35f2f64092e3e756132fcd574fafb532c0c2705d61f41ef8cf22684131c13d79be2766354d09d5263097a790bab363a72aca85d2e4385d05bd7fe5b4517fdf6b57b3067352993ae5aa776929c85414519534b58bac160b19af278c0b0", 0x8b, 0x44, 0x1}], 0x1) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x48) (async) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xcb, &(0x7f0000000000)={0x1, 0x1, 0x2, r2, 0x80000000}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6e}, {0xa, 0x4e22, 0x8, @empty, 0x2}, 0xffffffffffffffff, 0x3}}, 0x48) 07:48:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) socketpair(0x28, 0x80000, 0x8, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000000)=0x4) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getroute={0x1c, 0x1a, 0x4, 0x70bd26, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x9, 0xfd, 0x4, 0xfd, 0x3, 0x200}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8880}, 0x20000001) [ 2303.352779][T24891] tipc: Enabling of bearer rejected, failed to enable media [ 2303.380595][T24884] tipc: Enabling of bearer rejected, already enabled 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) 07:48:48 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xc03, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) [ 2303.414306][T24900] tipc: Enabling of bearer rejected, already enabled [ 2303.435959][T24908] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14) [ 2303.465961][T24915] tipc: Enabling of bearer rejected, already enabled [ 2303.503082][T24924] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000fc02058678a912249208e3bc1c7a7400e71161a18de8cdf4070c00000041000000180017000000000000"], 0x34}}, 0x0) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async, rerun: 32) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14) (rerun: 32) 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_deladdr={0x20, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x2, 0x78, 0x60, 0xc8, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000010}, 0x44084) 07:48:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x8800000, 0x0}}, 0xfffffdef) 07:48:48 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000fc02058678a912249208e3bc1c7a7400e71161a18de8cdf4070c00000041000000180017000000000000"], 0x34}}, 0x0) [ 2303.588804][T24931] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), r0) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000fc02058678a912249208e3bc1c7a7400e71161a18de8cdf4070c00000041000000180017000000000000"], 0x34}}, 0x0) 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) 07:48:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x406000, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x8e88d32e510f02bc, 0x3}}, 0x20) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000240)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private=0xa010100, 0x19, 0xd}}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000002100000227bd7000fbdbdf2502801020ab0000011000000008000bffffff0c000c4000000000000000060c002c40000000000000000308000200ac1414aa08000b0002000000080018004e204e24000000dfb317942460f2"], 0x5c}, 0x1, 0x0, 0x0, 0x64048001}, 0x2) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "0001ed", "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"}}, 0x110) write$cgroup_int(r0, &(0x7f0000000000)=0x1000, 0x12) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/kexec_crash_size', 0x18100, 0x10d) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x7, {"31cca3ff35c7c3d50e28614868288b5b"}, 0x4c0c, 0x1}}}, 0xa0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000b08ce89a1ef313e7ff6f83e7139522ea55778de07784ee211dcd140d0ea5c5110de40be7dbbd4c", @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newnexthop={0x20, 0x68, 0x8, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x1, 0x0, 0x36}, [@NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x20000800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x7, {"31cca3ff35c7c3d50e28614868288b5b"}, 0x4c0c, 0x1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x7, {"31cca3ff35c7c3d50e28614868288b5b"}, 0x4c0c, 0x1}}}, 0xa0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000b08ce89a1ef313e7ff6f83e7139522ea55778de07784ee211dcd140d0ea5c5110de40be7dbbd4c", @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000b08ce89a1ef313e7ff6f83e7139522ea55778de07784ee211dcd140d0ea5c5110de40be7dbbd4c", @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) [ 2303.672318][T24948] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newnexthop={0x20, 0x68, 0x8, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x1, 0x0, 0x36}, [@NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x20000800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:48 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x406000, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x8e88d32e510f02bc, 0x3}}, 0x20) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000240)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private=0xa010100, 0x19, 0xd}}) (async) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000002100000227bd7000fbdbdf2502801020ab0000011000000008000bffffff0c000c4000000000000000060c002c40000000000000000308000200ac1414aa08000b0002000000080018004e204e24000000dfb317942460f2"], 0x5c}, 0x1, 0x0, 0x0, 0x64048001}, 0x2) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "0001ed", "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"}}, 0x110) (async) write$cgroup_int(r0, &(0x7f0000000000)=0x1000, 0x12) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/kexec_crash_size', 0x18100, 0x10d) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 07:48:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x7, {"31cca3ff35c7c3d50e28614868288b5b"}, 0x4c0c, 0x1}}}, 0xa0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000b08ce89a1ef313e7ff6f83e7139522ea55778de07784ee211dcd140d0ea5c5110de40be7dbbd4c", @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x7, {"31cca3ff35c7c3d50e28614868288b5b"}, 0x4c0c, 0x1}}}, 0xa0) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000b08ce89a1ef313e7ff6f83e7139522ea55778de07784ee211dcd140d0ea5c5110de40be7dbbd4c", @ANYRES16=r5, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) 07:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) [ 2303.754653][T24966] tipc: Enabling of bearer rejected, failed to enable media 07:48:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xc000000, 0x0}}, 0xfffffdef) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newnexthop={0x20, 0x68, 0x8, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x1, 0x0, 0x36}, [@NHA_GROUP_TYPE={0x6, 0x3, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c0}, 0x20000800) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) [ 2303.825828][T24978] tipc: Enabling of bearer rejected, failed to enable media 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) 07:48:49 executing program 4: sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x20, 0x38, 0x4, 0x1000}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20048001}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x6, 0xffff, {"54b1b5222fb7f2ec8b4c24cc11d2f231"}, 0x64, 0x3, 0x5}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x406000, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x8e88d32e510f02bc, 0x3}}, 0x20) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000240)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private=0xa010100, 0x19, 0xd}}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000002100000227bd7000fbdbdf2502801020ab0000011000000008000bffffff0c000c4000000000000000060c002c40000000000000000308000200ac1414aa08000b0002000000080018004e204e24000000dfb317942460f2"], 0x5c}, 0x1, 0x0, 0x0, 0x64048001}, 0x2) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "0001ed", "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"}}, 0x110) write$cgroup_int(r0, &(0x7f0000000000)=0x1000, 0x12) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/kexec_crash_size', 0x18100, 0x10d) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x406000, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x8e88d32e510f02bc, 0x3}}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f0000000240)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private=0xa010100, 0x19, 0xd}}) (async) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000002100000227bd7000fbdbdf2502801020ab0000011000000008000bffffff0c000c4000000000000000060c002c40000000000000000308000200ac1414aa08000b0002000000080018004e204e24000000dfb317942460f2"], 0x5c}, 0x1, 0x0, 0x0, 0x64048001}, 0x2) (async) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "0001ed", "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"}}, 0x110) (async) write$cgroup_int(r0, &(0x7f0000000000)=0x1000, 0x12) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/kexec_crash_size', 0x18100, 0x10d) (async) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x6, 0xffff, {"54b1b5222fb7f2ec8b4c24cc11d2f231"}, 0x64, 0x3, 0x5}}}, 0x90) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:49 executing program 4: sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x20, 0x38, 0x4, 0x1000}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20048001}, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) [ 2303.928197][T24990] tipc: Enabling of bearer rejected, already enabled [ 2303.945131][T24995] tipc: Enabling of bearer rejected, failed to enable media 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x26d00, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x7800, 0x20, 0x2, 0x2, {{0x30, 0x4, 0x3, 0x2, 0xc0, 0x5, 0x0, 0x85, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @generic={0x44, 0x12, "ac2cbf7fd1bdcbcadc7c35de4b2f8547"}, @cipso={0x86, 0x31, 0x0, [{0x7, 0x11, "9b81b7f8cfb3c3527565a5f15767c6"}, {0x0, 0x4, "194f"}, {0x6, 0x7, "5f22b78524"}, {0x7, 0xf, "31c1b777327b87fb0f263b229e"}]}, @rr={0x7, 0xb, 0xc1, [@loopback, @dev={0xac, 0x14, 0x14, 0xb}]}, @cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x7, 0x4, "858f"}, {0x0, 0xa, "daeeb7f1711a0c1a"}, {0x6, 0xa, "51af6814950b648e"}, {0x6, 0xa, "8512a90cd97c14ee"}, {0x0, 0x8, "c76926457a93"}, {0x5, 0xb, "b90bfb5bf0b33a1f8f"}]}, @rr={0x7, 0x13, 0x63, [@private=0xa010100, @loopback, @multicast1, @broadcast]}, @lsrr={0x83, 0xb, 0xab, [@broadcast, @empty]}]}}}}}) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, r2, 0x3, {0x0, 0x0, 0x2}, 0x1}, 0x18) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000380)={'sit0\x00', r2, 0x1, 0x8, 0x9, 0x7fffffff, {{0xd, 0x4, 0x1, 0x3f, 0x34, 0x464, 0x0, 0x3, 0x4, 0x0, @remote, @broadcast, {[@generic={0x82, 0x6, "77d5cc51"}, @cipso={0x86, 0x19, 0x1, [{0x2, 0x7, "0e47ff9469"}, {0x2, 0x9, "0f1a0100050091"}, {0x0, 0x3, "cf"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'gretap0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0086008000004c6c000000ff480000600068000006049078e0eb000264010100442c5ba1ac1414aa000000ff0a01010100000009ac141414000001ffe0000001ffeffff8ffffffffffffff01861fffffffff0703f8b250dc7c2b00000000c99c3edb8e3f0004eeec0203fa00b24d7c6203e64b8570b20644231cfcf645411ef082c0bae790dd2b666f1e32e6cc94c8645286ef6247fc88b51ce56b07c92e7d2e"]}) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x6, 0xffff, {"54b1b5222fb7f2ec8b4c24cc11d2f231"}, 0x64, 0x3, 0x5}}}, 0x90) (async, rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (rerun: 64) 07:48:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x20000000, 0x0}}, 0xfffffdef) 07:48:49 executing program 4: sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x20, 0x38, 0x4, 0x1000}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20048001}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) (async) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x26d00, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x7800, 0x20, 0x2, 0x2, {{0x30, 0x4, 0x3, 0x2, 0xc0, 0x5, 0x0, 0x85, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @generic={0x44, 0x12, "ac2cbf7fd1bdcbcadc7c35de4b2f8547"}, @cipso={0x86, 0x31, 0x0, [{0x7, 0x11, "9b81b7f8cfb3c3527565a5f15767c6"}, {0x0, 0x4, "194f"}, {0x6, 0x7, "5f22b78524"}, {0x7, 0xf, "31c1b777327b87fb0f263b229e"}]}, @rr={0x7, 0xb, 0xc1, [@loopback, @dev={0xac, 0x14, 0x14, 0xb}]}, @cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x7, 0x4, "858f"}, {0x0, 0xa, "daeeb7f1711a0c1a"}, {0x6, 0xa, "51af6814950b648e"}, {0x6, 0xa, "8512a90cd97c14ee"}, {0x0, 0x8, "c76926457a93"}, {0x5, 0xb, "b90bfb5bf0b33a1f8f"}]}, @rr={0x7, 0x13, 0x63, [@private=0xa010100, @loopback, @multicast1, @broadcast]}, @lsrr={0x83, 0xb, 0xab, [@broadcast, @empty]}]}}}}}) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, r2, 0x3, {0x0, 0x0, 0x2}, 0x1}, 0x18) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000380)={'sit0\x00', r2, 0x1, 0x8, 0x9, 0x7fffffff, {{0xd, 0x4, 0x1, 0x3f, 0x34, 0x464, 0x0, 0x3, 0x4, 0x0, @remote, @broadcast, {[@generic={0x82, 0x6, "77d5cc51"}, @cipso={0x86, 0x19, 0x1, [{0x2, 0x7, "0e47ff9469"}, {0x2, 0x9, "0f1a0100050091"}, {0x0, 0x3, "cf"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'gretap0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0086008000004c6c000000ff480000600068000006049078e0eb000264010100442c5ba1ac1414aa000000ff0a01010100000009ac141414000001ffe0000001ffeffff8ffffffffffffff01861fffffffff0703f8b250dc7c2b00000000c99c3edb8e3f0004eeec0203fa00b24d7c6203e64b8570b20644231cfcf645411ef082c0bae790dd2b666f1e32e6cc94c8645286ef6247fc88b51ce56b07c92e7d2e"]}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x26d00, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x7800, 0x20, 0x2, 0x2, {{0x30, 0x4, 0x3, 0x2, 0xc0, 0x5, 0x0, 0x85, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @generic={0x44, 0x12, "ac2cbf7fd1bdcbcadc7c35de4b2f8547"}, @cipso={0x86, 0x31, 0x0, [{0x7, 0x11, "9b81b7f8cfb3c3527565a5f15767c6"}, {0x0, 0x4, "194f"}, {0x6, 0x7, "5f22b78524"}, {0x7, 0xf, "31c1b777327b87fb0f263b229e"}]}, @rr={0x7, 0xb, 0xc1, [@loopback, @dev={0xac, 0x14, 0x14, 0xb}]}, @cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x7, 0x4, "858f"}, {0x0, 0xa, "daeeb7f1711a0c1a"}, {0x6, 0xa, "51af6814950b648e"}, {0x6, 0xa, "8512a90cd97c14ee"}, {0x0, 0x8, "c76926457a93"}, {0x5, 0xb, "b90bfb5bf0b33a1f8f"}]}, @rr={0x7, 0x13, 0x63, [@private=0xa010100, @loopback, @multicast1, @broadcast]}, @lsrr={0x83, 0xb, 0xab, [@broadcast, @empty]}]}}}}}) (async) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, r2, 0x3, {0x0, 0x0, 0x2}, 0x1}, 0x18) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000380)={'sit0\x00', r2, 0x1, 0x8, 0x9, 0x7fffffff, {{0xd, 0x4, 0x1, 0x3f, 0x34, 0x464, 0x0, 0x3, 0x4, 0x0, @remote, @broadcast, {[@generic={0x82, 0x6, "77d5cc51"}, @cipso={0x86, 0x19, 0x1, [{0x2, 0x7, "0e47ff9469"}, {0x2, 0x9, "0f1a0100050091"}, {0x0, 0x3, "cf"}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'gretap0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0086008000004c6c000000ff480000600068000006049078e0eb000264010100442c5ba1ac1414aa000000ff0a01010100000009ac141414000001ffe0000001ffeffff8ffffffffffffff01861fffffffff0703f8b250dc7c2b00000000c99c3edb8e3f0004eeec0203fa00b24d7c6203e64b8570b20644231cfcf645411ef082c0bae790dd2b666f1e32e6cc94c8645286ef6247fc88b51ce56b07c92e7d2e"]}) (async) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) [ 2303.995378][T25017] tipc: Enabling of bearer rejected, already enabled [ 2304.024013][T25022] tipc: Enabling of bearer rejected, failed to enable media [ 2304.071754][T25036] tipc: Enabling of bearer rejected, failed to enable media [ 2304.080941][T25033] tipc: Enabling of bearer rejected, already enabled [ 2304.109274][T25038] tipc: Enabling of bearer rejected, already enabled 07:48:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x26d00, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x7800, 0x20, 0x2, 0x2, {{0x30, 0x4, 0x3, 0x2, 0xc0, 0x5, 0x0, 0x85, 0x2f, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @generic={0x44, 0x12, "ac2cbf7fd1bdcbcadc7c35de4b2f8547"}, @cipso={0x86, 0x31, 0x0, [{0x7, 0x11, "9b81b7f8cfb3c3527565a5f15767c6"}, {0x0, 0x4, "194f"}, {0x6, 0x7, "5f22b78524"}, {0x7, 0xf, "31c1b777327b87fb0f263b229e"}]}, @rr={0x7, 0xb, 0xc1, [@loopback, @dev={0xac, 0x14, 0x14, 0xb}]}, @cipso={0x86, 0x3b, 0xffffffffffffffff, [{0x7, 0x4, "858f"}, {0x0, 0xa, "daeeb7f1711a0c1a"}, {0x6, 0xa, "51af6814950b648e"}, {0x6, 0xa, "8512a90cd97c14ee"}, {0x0, 0x8, "c76926457a93"}, {0x5, 0xb, "b90bfb5bf0b33a1f8f"}]}, @rr={0x7, 0x13, 0x63, [@private=0xa010100, @loopback, @multicast1, @broadcast]}, @lsrr={0x83, 0xb, 0xab, [@broadcast, @empty]}]}}}}}) connect$can_j1939(r1, &(0x7f0000000000)={0x1d, r2, 0x3, {0x0, 0x0, 0x2}, 0x1}, 0x18) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000380)={'sit0\x00', r2, 0x1, 0x8, 0x9, 0x7fffffff, {{0xd, 0x4, 0x1, 0x3f, 0x34, 0x464, 0x0, 0x3, 0x4, 0x0, @remote, @broadcast, {[@generic={0x82, 0x6, "77d5cc51"}, @cipso={0x86, 0x19, 0x1, [{0x2, 0x7, "0e47ff9469"}, {0x2, 0x9, "0f1a0100050091"}, {0x0, 0x3, "cf"}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'gretap0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="0086008000004c6c000000ff480000600068000006049078e0eb000264010100442c5ba1ac1414aa000000ff0a01010100000009ac141414000001ffe0000001ffeffff8ffffffffffffff01861fffffffff0703f8b250dc7c2b00000000c99c3edb8e3f0004eeec0203fa00b24d7c6203e64b8570b20644231cfcf645411ef082c0bae790dd2b666f1e32e6cc94c8645286ef6247fc88b51ce56b07c92e7d2e"]}) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x884}, 0x4000) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRES64=0x0, @ANYBLOB="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"], 0x34}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="34004886", @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="77defd291352d53c809f3bc1d5eae3b58059ad30ab0a3a7dd56ad808ab3b652a8ce144dc11ecca3075f6b674032c128c48590e31198010b274ee3ddde32863b45b1a80ddaaf8c69c25ff3c30dbefd1d09b4d00ecee49499d52ccf680fae4c01d4baf4f345ad93fb9093ccf90ee5c299884cee6", @ANYRES16=r5, @ANYRESHEX=r4], 0x2c}, 0x1, 0x0, 0x0, 0x20}, 0x41) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0xfc112c25acf499f9, 0x108) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_INIT(r1, 0x29, 0xc8, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, {0xa, 0x4e23, 0xffffffff, @mcast2, 0xb39c}, 0xffffffffffffffff, 0x1000}}, 0x48) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x884}, 0x4000) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRES64=0x0, @ANYBLOB="050100000000000000000100000000001700000000000000006574683a6970366772653000c331951d9ad97e6c77543ead24490600000058788b3d9ffd84f6b441fb56c462aa541de058fc7303c9b5659705000000124e2716f671cd7474afcbecb0db97a4cc7bcf7d1ac1a7b2cc4609811e9e567c77ff0100000000000000905f367ef87ff67ddcf213838a7f8a80f533c09a69831ed0dc3219f822bb841eea1546e6e8767b7f8452fab5d7382baaed6fb0e3ce3269621281495f7533e22d3fafa6e0ef7f9af2e4e864fc641538282e3926be55b663bd9f4b35a502a89c5bc1455b105fa5c6bea72148e77c9da43a01e347d273d727babee42158172b73ebab27c1e03300d0da33eea0d0df848071ae95e8296915f9708ecce2d946cf4468756cdb73b2bc47791e0b56994aa49af4a55717a92f94d3833223532a87a189b71bb4e995025c9d4a2dab8d589d3a8219f42a"], 0x34}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="34004886", @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="77defd291352d53c809f3bc1d5eae3b58059ad30ab0a3a7dd56ad808ab3b652a8ce144dc11ecca3075f6b674032c128c48590e31198010b274ee3ddde32863b45b1a80ddaaf8c69c25ff3c30dbefd1d09b4d00ecee49499d52ccf680fae4c01d4baf4f345ad93fb9093ccf90ee5c299884cee6", @ANYRES16=r5, @ANYRESHEX=r4], 0x2c}, 0x1, 0x0, 0x0, 0x20}, 0x41) [ 2304.182902][T25044] tipc: Enabling of bearer rejected, failed to enable media 07:48:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xff010000, 0x0}}, 0xfffffdef) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (rerun: 32) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x884}, 0x4000) (async, rerun: 32) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYRES16=r1, @ANYRES64=0x0, @ANYBLOB="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"], 0x34}}, 0x0) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="34004886", @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) (async, rerun: 32) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 32) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="77defd291352d53c809f3bc1d5eae3b58059ad30ab0a3a7dd56ad808ab3b652a8ce144dc11ecca3075f6b674032c128c48590e31198010b274ee3ddde32863b45b1a80ddaaf8c69c25ff3c30dbefd1d09b4d00ecee49499d52ccf680fae4c01d4baf4f345ad93fb9093ccf90ee5c299884cee6", @ANYRES16=r5, @ANYRESHEX=r4], 0x2c}, 0x1, 0x0, 0x0, 0x20}, 0x41) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0xfc112c25acf499f9, 0x108) (rerun: 32) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_INIT(r1, 0x29, 0xc8, &(0x7f00000000c0), 0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, {0xa, 0x4e23, 0xffffffff, @mcast2, 0xb39c}, 0xffffffffffffffff, 0x1000}}, 0x48) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0xfc112c25acf499f9, 0x108) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_INIT(r1, 0x29, 0xc8, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, {0xa, 0x4e23, 0xffffffff, @mcast2, 0xb39c}, 0xffffffffffffffff, 0x1000}}, 0x48) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0xfc112c25acf499f9, 0x108) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) setsockopt$MRT6_INIT(r1, 0x29, 0xc8, &(0x7f00000000c0), 0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, {0xa, 0x4e23, 0xffffffff, @mcast2, 0xb39c}, 0xffffffffffffffff, 0x1000}}, 0x48) (async) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050100000000000000005f51f330cdb6210b50444d6f9f07010000000000000001410000001800170000000000000000bf74683a6970366702003000a94586972b98ef"], 0x34}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048010}, 0x40000) 07:48:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) timerfd_create(0x1, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050100000000000000005f51f330cdb6210b50444d6f9f07010000000000000001410000001800170000000000000000bf74683a6970366702003000a94586972b98ef"], 0x34}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048010}, 0x40000) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x800800000000, 0x0}}, 0xfffffdef) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000080)=0x3) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, '\x00', 0x23}, 0x8}, r3, 0x21603fe3}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) 07:48:49 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050100000000000000005f51f330cdb6210b50444d6f9f07010000000000000001410000001800170000000000000000bf74683a6970366702003000a94586972b98ef"], 0x34}}, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048010}, 0x40000) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000080)=0x3) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000080)=0x3) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, '\x00', 0x23}, 0x8}, r3, 0x21603fe3}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, '\x00', 0x23}, 0x8}, r3, 0x21603fe3}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) (async) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x33dd400, 0x1, 0xa8, 0x2}}}}, 0x30}, 0x1, 0x0, 0x0, 0x8c0}, 0x24000080) 07:48:49 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2304.528025][T25122] tipc: Enabling of bearer rejected, already enabled 07:48:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) timerfd_create(0x1, 0x80000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:49 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000080)=0x3) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:48:49 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, '\x00', 0x23}, 0x8}, r3, 0x21603fe3}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) 07:48:49 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x7ffffffffffff, 0x0}}, 0xfffffdef) 07:48:49 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async, rerun: 32) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x33dd400, 0x1, 0xa8, 0x2}}}}, 0x30}, 0x1, 0x0, 0x0, 0x8c0}, 0x24000080) (rerun: 32) 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x44a101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0xffffffffffffffd0, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xfff}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x7fffffff, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x3}, r1}}, 0x38) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000340)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:48:49 executing program 5: r0 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="a4bf0a366c3a936247bf969e390a388101842f5f5ea3fc1f1bc79ec66f93d481adeee5824bf0dd8ea0f110a841932c7f3b9e84b88d95195810df1bbef4c2c8bf8ddc4e37c6ef3b238d7a79c66110ab3087", 0x51, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)=':!-[%[.\x00', r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x98001, 0x408) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x4902, 0x0) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e23, 0x8, @local, 0x4}, {0xa, 0x4e24, 0x7f, @local}, 0x0, {[0x3ff, 0x2d, 0x7, 0x6, 0x0, 0x80000000, 0x1, 0x4]}}, 0x5c) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x9d76) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:49 executing program 5: r0 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="a4bf0a366c3a936247bf969e390a388101842f5f5ea3fc1f1bc79ec66f93d481adeee5824bf0dd8ea0f110a841932c7f3b9e84b88d95195810df1bbef4c2c8bf8ddc4e37c6ef3b238d7a79c66110ab3087", 0x51, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)=':!-[%[.\x00', r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x98001, 0x408) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x4902, 0x0) (rerun: 32) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e23, 0x8, @local, 0x4}, {0xa, 0x4e24, 0x7f, @local}, 0x0, {[0x3ff, 0x2d, 0x7, 0x6, 0x0, 0x80000000, 0x1, 0x4]}}, 0x5c) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x9d76) [ 2304.669163][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.690763][T25139] tipc: Enabling of bearer rejected, already enabled 07:48:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x44a101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0xffffffffffffffd0, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xfff}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x7fffffff, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x3}, r1}}, 0x38) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000340)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) [ 2304.713221][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.741217][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.766434][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.774480][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.783399][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.791380][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.800053][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.808028][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.822539][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.839471][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.852553][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.864189][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.875616][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.883656][T25139] tipc: Enabling of bearer rejected, already enabled 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x44a101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0xffffffffffffffd0, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xfff}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e23, 0x7fffffff, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x3}, r1}}, 0x38) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000340)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 5: r0 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="a4bf0a366c3a936247bf969e390a388101842f5f5ea3fc1f1bc79ec66f93d481adeee5824bf0dd8ea0f110a841932c7f3b9e84b88d95195810df1bbef4c2c8bf8ddc4e37c6ef3b238d7a79c66110ab3087", 0x51, 0xfffffffffffffffe) request_key(&(0x7f0000000380)='id_legacy\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)=':!-[%[.\x00', r0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x98001, 0x408) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x4902, 0x0) (rerun: 64) setsockopt$MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e23, 0x8, @local, 0x4}, {0xa, 0x4e24, 0x7f, @local}, 0x0, {[0x3ff, 0x2d, 0x7, 0x6, 0x0, 0x80000000, 0x1, 0x4]}}, 0x5c) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "14aeccdd88da63a0f59c6082858a36b47ccee6f76f834273936de2172b0c358057ccff13c20551a6b92d87b055fcd76d04441926744d3d8ff2be5bf709ccdecc6ff5fc405d9552d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04bb97f9807c96f84ecf9022f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8c54a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa900000000f20702d8b82d82151e016cc900"}}, 0x9d76) 07:48:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x10000000000000, 0x0}}, 0xfffffdef) 07:48:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) timerfd_create(0x1, 0x80000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) [ 2304.892665][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.904101][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.918736][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.939944][T25139] tipc: Enabling of bearer rejected, already enabled [ 2304.974694][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.001276][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.014317][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.037382][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.055866][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.066308][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.074315][T25139] tipc: Enabling of bearer rejected, already enabled 07:48:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'ip_vti0\x00', 0x0, 0x8000, 0x8, 0x4, 0x1, {{0x6, 0x4, 0x3, 0x8, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2b}, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'gre0\x00', r2, 0x80, 0x700, 0x7, 0x0, {{0x10, 0x4, 0x3, 0x8, 0x40, 0x65, 0x0, 0xc0, 0x2d, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @private=0xa010102, {[@ssrr={0x89, 0x7, 0x68, [@broadcast]}, @timestamp={0x44, 0x8, 0xea, 0x0, 0x0, [0x1000]}, @rr={0x7, 0x1b, 0x37, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x19}, @remote]}]}}}}}) socketpair(0xa, 0x1, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73797aff6e6c60000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010007000100010009aa0049e3006400670000080490787f000001ffffffff864c0000000301020208ca2ed7805e2e010581e7990010010e3af8cc2bb05d90e7b4ff34a7020611f4eb5f0212b5fb046acacc94b8432fe9f80a42f28d000f55118624e6e52cbf92c78d57a301000000"]}) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x7ff}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x3f7, 0x800, 0x70bd2d, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0xc800}, 0x20008880) io_uring_setup(0x1d99, &(0x7f0000000900)={0x0, 0xb667, 0x20, 0x0, 0x397, 0x0, r0}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200300, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000480)={0x0, 0x9, 0x3}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x3, {0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x38) socket(0x28, 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x100010, r1, 0x10000000) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000980)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), &(0x7f0000000440)=0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_ASSERT(r5, 0x29, 0xcf, &(0x7f00000000c0), 0x4) syz_io_uring_submit(0x0, r3, &(0x7f00000003c0)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x2008}}) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="08002cbd7000ffdbdf250100000000000000024100000014001369623a73797a6b616c6c657231000000"], 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/class/misc', 0x80400, 0xe0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "5521ed", "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"}}, 0x110) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x3f7, 0x781, 0x70bd25, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x45010}, 0xc004) 07:48:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x20, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x33dd400, 0x1, 0xa8, 0x2}}}}, 0x30}, 0x1, 0x0, 0x0, 0x8c0}, 0x24000080) 07:48:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x3f7, 0x800, 0x70bd2d, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0xc800}, 0x20008880) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x3f7, 0x800, 0x70bd2d, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0xc800}, 0x20008880) io_uring_setup(0x1d99, &(0x7f0000000900)={0x0, 0xb667, 0x20, 0x0, 0x397, 0x0, r0}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200300, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000480)={0x0, 0x9, 0x3}) (async) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000480)={0x0, 0x9, 0x3}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x3, {0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x38) socket(0x28, 0x2, 0x0) (async) socket(0x28, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x100010, r1, 0x10000000) (async) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x100010, r1, 0x10000000) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000980)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), &(0x7f0000000440)=0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_ASSERT(r5, 0x29, 0xcf, &(0x7f00000000c0), 0x4) (async) setsockopt$MRT6_ASSERT(r5, 0x29, 0xcf, &(0x7f00000000c0), 0x4) syz_io_uring_submit(0x0, r3, &(0x7f00000003c0)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x2008}}) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="08002cbd7000ffdbdf250100000000000000024100000014001369623a73797a6b616c6c657231000000"], 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/class/misc', 0x80400, 0xe0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "5521ed", "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"}}, 0x110) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x3f7, 0x781, 0x70bd25, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x45010}, 0xc004) [ 2305.083404][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.091398][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.100527][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.108595][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.116621][T25139] tipc: Enabling of bearer rejected, already enabled [ 2305.125686][T25139] tipc: Enabling of bearer rejected, already enabled 07:48:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x3f7, 0x800, 0x70bd2d, 0x25dfdbfc, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0xc800}, 0x20008880) io_uring_setup(0x1d99, &(0x7f0000000900)={0x0, 0xb667, 0x20, 0x0, 0x397, 0x0, r0}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200300, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200300, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000480)={0x0, 0x9, 0x3}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x3, {0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x38) socket(0x28, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x100010, r1, 0x10000000) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000980)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000980)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) getsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000400), &(0x7f0000000440)=0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_ASSERT(r5, 0x29, 0xcf, &(0x7f00000000c0), 0x4) syz_io_uring_submit(0x0, r3, &(0x7f00000003c0)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x2008}}) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="08002cbd7000ffdbdf250100000000000000024100000014001369623a73797a6b616c6c657231000000"], 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x10) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="08002cbd7000ffdbdf250100000000000000024100000014001369623a73797a6b616c6c657231000000"], 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/class/misc', 0x80400, 0xe0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "5521ed", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "5521ed", "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"}}, 0x110) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x3f7, 0x781, 0x70bd25, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x45010}, 0xc004) (async) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x3f7, 0x781, 0x70bd25, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x45010}, 0xc004) [ 2305.167185][T25177] ================================================================== [ 2305.169989][T25178] tipc: Enabling of bearer rejected, already enabled [ 2305.175280][T25177] BUG: KCSAN: data-race in __percpu_counter_compare / percpu_counter_add_batch [ 2305.192096][T25177] [ 2305.194420][T25177] read-write to 0xffff888100139b50 of 8 bytes by task 25160 on cpu 0: [ 2305.202572][T25177] percpu_counter_add_batch+0xc9/0x140 [ 2305.208046][T25177] shmem_recalc_inode+0x148/0x1d0 07:48:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1501ed", "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"}}, 0x110) [ 2305.213083][T25177] shmem_undo_range+0x969/0x9a0 [ 2305.217949][T25177] shmem_evict_inode+0x153/0x530 [ 2305.222908][T25177] evict+0x1aa/0x410 [ 2305.226807][T25177] iput+0x42c/0x5b0 [ 2305.230631][T25177] dentry_unlink_inode+0x22a/0x240 [ 2305.235752][T25177] __dentry_kill+0x2db/0x4a0 [ 2305.240350][T25177] dentry_kill+0x8d/0x1e0 [ 2305.244685][T25177] dput+0x118/0x1f0 [ 2305.248499][T25177] __fput+0x464/0x5f0 [ 2305.252487][T25177] __fput_sync+0x44/0x50 [ 2305.256739][T25177] __se_sys_close+0xfa/0x1a0 [ 2305.261334][T25177] __x64_sys_close+0x1f/0x30 [ 2305.265932][T25177] do_syscall_64+0x41/0xc0 [ 2305.270365][T25177] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2305.276267][T25177] [ 2305.278581][T25177] read to 0xffff888100139b50 of 8 bytes by task 25177 on cpu 1: [ 2305.286188][T25177] __percpu_counter_compare+0x2b/0x1d0 [ 2305.291635][T25177] shmem_inode_acct_block+0xf6/0x220 [ 2305.296905][T25177] shmem_get_folio_gfp+0x4ad/0xc30 [ 2305.302091][T25177] shmem_write_begin+0xa6/0x210 [ 2305.306928][T25177] generic_perform_write+0x1c9/0x410 [ 2305.312200][T25177] shmem_file_write_iter+0xc8/0xe0 [ 2305.317303][T25177] vfs_write+0x4ab/0x7d0 [ 2305.321530][T25177] ksys_write+0xeb/0x1a0 [ 2305.325755][T25177] __x64_sys_write+0x42/0x50 [ 2305.330327][T25177] do_syscall_64+0x41/0xc0 [ 2305.334728][T25177] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2305.340600][T25177] [ 2305.342907][T25177] value changed: 0x000000000000103f -> 0x0000000000000040 [ 2305.350004][T25177] [ 2305.352305][T25177] Reported by Kernel Concurrency Sanitizer on: 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1501ed", "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"}}, 0x110) [ 2305.358433][T25177] CPU: 1 PID: 25177 Comm: syz-executor.1 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2305.368478][T25177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2305.378523][T25177] ================================================================== 07:48:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'ip_vti0\x00', 0x0, 0x8000, 0x8, 0x4, 0x1, {{0x6, 0x4, 0x3, 0x8, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2b}, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'gre0\x00', r2, 0x80, 0x700, 0x7, 0x0, {{0x10, 0x4, 0x3, 0x8, 0x40, 0x65, 0x0, 0xc0, 0x2d, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @private=0xa010102, {[@ssrr={0x89, 0x7, 0x68, [@broadcast]}, @timestamp={0x44, 0x8, 0xea, 0x0, 0x0, [0x1000]}, @rr={0x7, 0x1b, 0x37, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x19}, @remote]}]}}}}}) (async) socketpair(0xa, 0x1, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73797aff6e6c60000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010007000100010009aa0049e3006400670000080490787f000001ffffffff864c0000000301020208ca2ed7805e2e010581e7990010010e3af8cc2bb05d90e7b4ff34a7020611f4eb5f0212b5fb046acacc94b8432fe9f80a42f28d000f55118624e6e52cbf92c78d57a301000000"]}) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x2, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x7ff}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:50 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1501ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0d358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x100000000000000, 0x0}}, 0xfffffdef) 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/pata_oldpiix', 0x8800, 0x182) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000752b41b9a2a05f94e7ec01000000001700000000000000006574683a69703667726d30004a9d576609dec7e5a1b3adf761e74409e6f0b4136ad7fe399bd37ab8027cbd7845d8ecb787f4b2575da9c892d25bedc3d3a9f95fae6b81305c389b0fe78a056d806bcd7aca3ef1a6dd3b6275e6408bddce4f486e43572c30b5e3b0e78892c713b45cb5377e2d691b2d7a878428b1b1d62180747a25d4136f866cb57b8fcde2b11bbfbb16340fae048b541824529d19c3795d2bc05d2c0323a6"], 0x34}}, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0xe4099ff8a0f3a80c, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 07:48:50 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/usbtest', 0x8000, 0x10a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xa125}]}, 0x60}}, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) socket$igmp6(0xa, 0x3, 0x2) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x2, 0x3}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) (async, rerun: 32) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x7ff}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/pata_oldpiix', 0x8800, 0x182) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000752b41b9a2a05f94e7ec01000000001700000000000000006574683a69703667726d30004a9d576609dec7e5a1b3adf761e74409e6f0b4136ad7fe399bd37ab8027cbd7845d8ecb787f4b2575da9c892d25bedc3d3a9f95fae6b81305c389b0fe78a056d806bcd7aca3ef1a6dd3b6275e6408bddce4f486e43572c30b5e3b0e78892c713b45cb5377e2d691b2d7a878428b1b1d62180747a25d4136f866cb57b8fcde2b11bbfbb16340fae048b541824529d19c3795d2bc05d2c0323a6"], 0x34}}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0xe4099ff8a0f3a80c, 0x0) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0xe4099ff8a0f3a80c, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 07:48:50 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/usbtest', 0x8000, 0x10a) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xa125}]}, 0x60}}, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) (async) socket$igmp6(0xa, 0x3, 0x2) 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2305.525099][T25215] tipc: Enabling of bearer rejected, failed to enable media [ 2305.594476][T25230] tipc: Enabling of bearer rejected, failed to enable media 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipmr_getroute={0x1c, 0x1a, 0x200, 0x70bd25, 0x25dfdbfe, {0x80, 0x10, 0x40, 0x8, 0xfe, 0x3, 0xfd, 0x2, 0x4400}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/pata_oldpiix', 0x8800, 0x182) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) (async) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000752b41b9a2a05f94e7ec01000000001700000000000000006574683a69703667726d30004a9d576609dec7e5a1b3adf761e74409e6f0b4136ad7fe399bd37ab8027cbd7845d8ecb787f4b2575da9c892d25bedc3d3a9f95fae6b81305c389b0fe78a056d806bcd7aca3ef1a6dd3b6275e6408bddce4f486e43572c30b5e3b0e78892c713b45cb5377e2d691b2d7a878428b1b1d62180747a25d4136f866cb57b8fcde2b11bbfbb16340fae048b541824529d19c3795d2bc05d2c0323a6"], 0x34}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000752b41b9a2a05f94e7ec01000000001700000000000000006574683a69703667726d30004a9d576609dec7e5a1b3adf761e74409e6f0b4136ad7fe399bd37ab8027cbd7845d8ecb787f4b2575da9c892d25bedc3d3a9f95fae6b81305c389b0fe78a056d806bcd7aca3ef1a6dd3b6275e6408bddce4f486e43572c30b5e3b0e78892c713b45cb5377e2d691b2d7a878428b1b1d62180747a25d4136f866cb57b8fcde2b11bbfbb16340fae048b541824529d19c3795d2bc05d2c0323a6"], 0x34}}, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0xe4099ff8a0f3a80c, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 07:48:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x200000000000000, 0x0}}, 0xfffffdef) 07:48:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'ip_vti0\x00', 0x0, 0x8000, 0x8, 0x4, 0x1, {{0x6, 0x4, 0x3, 0x8, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2b}, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'gre0\x00', r2, 0x80, 0x700, 0x7, 0x0, {{0x10, 0x4, 0x3, 0x8, 0x40, 0x65, 0x0, 0xc0, 0x2d, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @private=0xa010102, {[@ssrr={0x89, 0x7, 0x68, [@broadcast]}, @timestamp={0x44, 0x8, 0xea, 0x0, 0x0, [0x1000]}, @rr={0x7, 0x1b, 0x37, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x19}, @remote]}]}}}}}) (async, rerun: 32) socketpair(0xa, 0x1, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73797aff6e6c60000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010007000100010009aa0049e3006400670000080490787f000001ffffffff864c0000000301020208ca2ed7805e2e010581e7990010010e3af8cc2bb05d90e7b4ff34a7020611f4eb5f0212b5fb046acacc94b8432fe9f80a42f28d000f55118624e6e52cbf92c78d57a301000000"]}) 07:48:50 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/usbtest', 0x8000, 0x10a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xa125}]}, 0x60}}, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) socket$igmp6(0xa, 0x3, 0x2) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipmr_getroute={0x1c, 0x1a, 0x200, 0x70bd25, 0x25dfdbfe, {0x80, 0x10, 0x40, 0x8, 0xfe, 0x3, 0xfd, 0x2, 0x4400}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x8) 07:48:50 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'ip_vti0\x00', 0x0, 0x8000, 0x8, 0x4, 0x1, {{0x6, 0x4, 0x3, 0x8, 0x18, 0x66, 0x0, 0x80, 0x2f, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2b}, {[@end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'gre0\x00', r2, 0x80, 0x700, 0x7, 0x0, {{0x10, 0x4, 0x3, 0x8, 0x40, 0x65, 0x0, 0xc0, 0x2d, 0x0, @dev={0xac, 0x14, 0x14, 0xd}, @private=0xa010102, {[@ssrr={0x89, 0x7, 0x68, [@broadcast]}, @timestamp={0x44, 0x8, 0xea, 0x0, 0x0, [0x1000]}, @rr={0x7, 0x1b, 0x37, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @empty, @dev={0xac, 0x14, 0x14, 0x19}, @remote]}]}}}}}) socketpair(0xa, 0x1, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'erspan0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73797aff6e6c60000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010007000100010009aa0049e3006400670000080490787f000001ffffffff864c0000000301020208ca2ed7805e2e010581e7990010010e3af8cc2bb05d90e7b4ff34a7020611f4eb5f0212b5fb046acacc94b8432fe9f80a42f28d000f55118624e6e52cbf92c78d57a301000000"]}) [ 2305.714080][T25239] tipc: Enabling of bearer rejected, failed to enable media 07:48:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipmr_getroute={0x1c, 0x1a, 0x200, 0x70bd25, 0x25dfdbfe, {0x80, 0x10, 0x40, 0x8, 0xfe, 0x3, 0xfd, 0x2, 0x4400}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipmr_getroute={0x1c, 0x1a, 0x200, 0x70bd25, 0x25dfdbfe, {0x80, 0x10, 0x40, 0x8, 0xfe, 0x3, 0xfd, 0x2, 0x4400}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) (async) 07:48:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xb7, "65f183", "c8c2997c2bcca8d987aaf8e7c2c91066541abd2668e7ec6f30a4d8d3a0bc7fb71d263e57b481ce83609341354635af8aee27cdb2acea98d3c76f75104eb92c7e2d1ba8b8e4c7624fc113b5d3992eb0a64bb026ec827402ca4617fbf5e91d51c5305c8b1fb465f4e90c08f528ab8c579dd6113ade0d869fe6a5bc4899b741ad6b132eb8c0a9af090a92ade0d6a323e7027acb636b5c7ac516b61d22cea5af63bad64d1d302f2913ea9de323d612f355872862e751dc8058240f3e524bee47e478f2ef142ac4012e16dc32f41890b7ab013ef390295575c27340193dc7e80f2857c412136302ad8796c07f2f15d78acff639628b3fb6d840d4818030629d906ff4"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "1525ed", "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"}}, 0x110) 07:48:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async, rerun: 64) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x8) (rerun: 64) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2305.780257][T25254] tipc: Enabling of bearer rejected, already enabled [ 2305.850459][T25276] tipc: Enabling of bearer rejected, already enabled 07:48:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x204000000000000, 0x0}}, 0xfffffdef) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xb7, "65f183", "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "1525ed", "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"}}, 0x110) 07:48:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$AUDIT_SIGNAL_INFO(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x100, 0x70bd28, 0x25dfdbff, "", ["", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x8) 07:48:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x604, 0x0}}, 0xfffffdef) 07:48:51 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) 07:48:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x400000000000000, 0x0}}, 0xfffffdef) 07:48:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xb7, "65f183", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "1525ed", "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"}}, 0x110) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:51 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) [ 2306.417463][T25353] tipc: Enabling of bearer rejected, already enabled 07:48:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x421}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x24010004) msgget(0x2, 0x18) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000010000001ce60000114100000018001700000074683a6970366772653019"], 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 07:48:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x8}}, 0xfffffdef) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:51 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) 07:48:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x421}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x24010004) (async) msgget(0x2, 0x18) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000010000001ce60000114100000018001700000074683a6970366772653019"], 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:51 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0xff01000000000000, 0x0}}, 0xfffffdef) 07:48:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) 07:48:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x500000000000000, 0x0}}, 0xfffffdef) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x421}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x24010004) (async) msgget(0x2, 0x18) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05010000000000000000010000001ce60000114100000018001700000074683a6970366772653019"], 0x34}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) 07:48:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) (async) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) 07:48:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x6}}, 0x10) 07:48:51 executing program 4: r0 = socket(0x29, 0x800, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x424}, 0x1, 0x0, 0x0, 0x20004010}, 0x4008004) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="34020080", @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r4, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x1ff}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3c5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 07:48:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) 07:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x0) 07:48:51 executing program 4: r0 = socket(0x29, 0x800, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x424}, 0x1, 0x0, 0x0, 0x20004010}, 0x4008004) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="34020080", @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r4, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x1ff}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3c5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) socket(0x29, 0x800, 0x9) (async) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="24040000f403000225bd7000fbdbdf2502000000010000002e00000001000000800000000300000000080000000200000000008002000000010000000100000007000000010400008100000009000000001000000010000002000000e11000000000008000000000010000000100000001000000f8ffffff01000000fdffffff050000003074ffff0300000019000000090000000002000006000000ffffff7fcd170000ffffff7f090000004900000004000000000000007f000000050000000300000006000000d9ea2b020500000000040000070000000900000006000000f7ffffffbe000000050000000002000003000000feffffff0100008090c60000010000003f00000005000000060000000300000000800000ba01000006000000010000000000008008000000a7000000ff03000005000000080000000000000003000000df46000002000000008000004f0f0000010000008e030000090000000200000000000000030000000700000008000000439b000006000000030000008007000001000100d53e0000070000000000800700000000080000000000010007ffffff00000000f9ffffff0500000003000000ff00000007000000ff01000004000000000000000100010003000000ff0300000800000009000000fbffffff0ce83519040000000100000002000000f8ffffff0104000005000000060000002967000009000000008000000100010000080000040000000100000008000000000400000600000002000000070000000200000020000000e6000000010000800700000004000000030000000a0a0000810000000000000051010000040000001d0000001f000000fffffffffbffffff0200000001000100020000001f00000001000000ff0100000fe30000020000003f000000050000000600000080c9ffff200000000800000001000000010000000400000093320000ffffff7f01000000ff0f00004b0c00000000000000000006000000000000800000000003000000ffff00000800000004000000ff030000bc000000ff0100007f000000050000000800000009000000cd000000080000000500000000ffffff00000000ff0300007c000000f7ffffff000000001caf00000100008046000000ffffffff030000000100000001000000090000000500000006000000030000002980000000000100fe01000003000000ff0000050000000001800000e9ea714007000000e87a2b1605000000ffff00000500000006000000ff0000007f000000030000001f0000000500000000000000465c000000080000d40e000003000000040000000180000009000000ffffffff000001004000000008000000ffffff7f01000080ff010000090000000400000000000000010000000500000000100000b53d000020000000080000008a06000008000000030000000200000049000000"], 0x424}, 0x1, 0x0, 0x0, 0x20004010}, 0x4008004) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="34020080", @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r4, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x1ff}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3c5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) (async) [ 2306.794047][T25407] tipc: Enabling of bearer rejected, failed to enable media 07:48:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0xff01000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:48:52 executing program 4: r0 = socket(0x29, 0x800, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="24040000f403000225bd7000fbdbdf2502000000010000002e00000001000000800000000300000000080000000200000000008002000000010000000100000007000000010400008100000009000000001000000010000002000000e11000000000008000000000010000000100000001000000f8ffffff01000000fdffffff050000003074ffff0300000019000000090000000002000006000000ffffff7fcd170000ffffff7f090000004900000004000000000000007f000000050000000300000006000000d9ea2b020500000000040000070000000900000006000000f7ffffffbe000000050000000002000003000000feffffff0100008090c60000010000003f00000005000000060000000300000000800000ba01000006000000010000000000008008000000a7000000ff03000005000000080000000000000003000000df46000002000000008000004f0f0000010000008e030000090000000200000000000000030000000700000008000000439b000006000000030000008007000001000100d53e0000070000000000800700000000080000000000010007ffffff00000000f9ffffff0500000003000000ff00000007000000ff01000004000000000000000100010003000000ff0300000800000009000000fbffffff0ce83519040000000100000002000000f8ffffff0104000005000000060000002967000009000000008000000100010000080000040000000100000008000000000400000600000002000000070000000200000020000000e6000000010000800700000004000000030000000a0a0000810000000000000051010000040000001d0000001f000000fffffffffbffffff0200000001000100020000001f00000001000000ff0100000fe30000020000003f000000050000000600000080c9ffff200000000800000001000000010000000400000093320000ffffff7f01000000ff0f00004b0c00000000000000000006000000000000800000000003000000ffff00000800000004000000ff030000bc000000ff0100007f000000050000000800000009000000cd000000080000000500000000ffffff00000000ff0300007c000000f7ffffff000000001caf00000100008046000000ffffffff030000000100000001000000090000000500000006000000030000002980000000000100fe01000003000000ff0000050000000001800000e9ea714007000000e87a2b1605000000ffff00000500000006000000ff0000007f000000030000001f0000000500000000000000465c000000080000d40e000003000000040000000180000009000000ffffffff000001004000000008000000ffffff7f01000080ff010000090000000400000000000000010000000500000000100000b53d000020000000080000008a06000008000000030000000200000049000000"], 0x424}, 0x1, 0x0, 0x0, 0x20004010}, 0x4008004) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="34020080", @ANYRES16=r2, @ANYBLOB="050100000000000000000100000000000000014100000018001700000000000000006574683a6970366772653000"], 0x34}}, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r4, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x1ff}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3c5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 07:48:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x6}}, 0x10) 07:48:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x600000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x600000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x500000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) (async) 07:48:52 executing program 1: socketpair(0x29, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="41a8ba10d538811a98af31c64483def574a5152e6257dfa781221ff7fa82002be0997a90f782e188b6670942ac8e030ecad0b9730f6738906169a9dc89c57d597a2447f1b58c376c90e464175f3a7c39caf61b43ed52f901ebd632bbac13f2d7cc31cc48aa616f1f90fa50894df6f21fd719485e8d2bfd3641aa56583b5a779a1b1f446bda73fd", 0x87}, 0x1, 0x0, 0x0, 0x40080}, 0xc010) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x604000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x6}}, 0x10) 07:48:52 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0xff01000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x8, 0x1, @ib={0x1b, 0x8000, 0x6c8a, {"c921dda8b49d2e56e67d7d9ff0704bef"}, 0x0, 0xb18, 0x2}}}, 0xa0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000280)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in={0x2, 0x4e20, @local}}}, 0x90) 07:48:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x800800000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x8, 0x1, @ib={0x1b, 0x8000, 0x6c8a, {"c921dda8b49d2e56e67d7d9ff0704bef"}, 0x0, 0xb18, 0x2}}}, 0xa0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000280)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in={0x2, 0x4e20, @local}}}, 0x90) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x8, 0x1, @ib={0x1b, 0x8000, 0x6c8a, {"c921dda8b49d2e56e67d7d9ff0704bef"}, 0x0, 0xb18, 0x2}}}, 0xa0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000280)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in={0x2, 0x4e20, @local}}}, 0x90) 07:48:52 executing program 1: socketpair(0x29, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="41a8ba10d538811a98af31c64483def574a5152e6257dfa781221ff7fa82002be0997a90f782e188b6670942ac8e030ecad0b9730f6738906169a9dc89c57d597a2447f1b58c376c90e464175f3a7c39caf61b43ed52f901ebd632bbac13f2d7cc31cc48aa616f1f90fa50894df6f21fd719485e8d2bfd3641aa56583b5a779a1b1f446bda73fd", 0x87}, 0x1, 0x0, 0x0, 0x40080}, 0xc010) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) socketpair(0x29, 0xa, 0x3, &(0x7f0000000000)) (async) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="41a8ba10d538811a98af31c64483def574a5152e6257dfa781221ff7fa82002be0997a90f782e188b6670942ac8e030ecad0b9730f6738906169a9dc89c57d597a2447f1b58c376c90e464175f3a7c39caf61b43ed52f901ebd632bbac13f2d7cc31cc48aa616f1f90fa50894df6f21fd719485e8d2bfd3641aa56583b5a779a1b1f446bda73fd", 0x87}, 0x1, 0x0, 0x0, 0x40080}, 0xc010) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x8, 0x1, @ib={0x1b, 0x8000, 0x6c8a, {"c921dda8b49d2e56e67d7d9ff0704bef"}, 0x0, 0xb18, 0x2}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x4}}, 0x20) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x8, 0x1, @ib={0x1b, 0x8000, 0x6c8a, {"c921dda8b49d2e56e67d7d9ff0704bef"}, 0x0, 0xb18, 0x2}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 07:48:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x800000000000000, 0x0}}, 0xfffffdef) 07:48:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, 0xffffffffffffffff, 0x8, 0x1, @ib={0x1b, 0x8000, 0x6c8a, {"c921dda8b49d2e56e67d7d9ff0704bef"}, 0x0, 0xb18, 0x2}}}, 0xa0) 07:48:52 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x6}}, 0x10) 07:48:53 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x612101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {r3, 0xff, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0x110) 07:48:53 executing program 1: socketpair(0x29, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="41a8ba10d538811a98af31c64483def574a5152e6257dfa781221ff7fa82002be0997a90f782e188b6670942ac8e030ecad0b9730f6738906169a9dc89c57d597a2447f1b58c376c90e464175f3a7c39caf61b43ed52f901ebd632bbac13f2d7cc31cc48aa616f1f90fa50894df6f21fd719485e8d2bfd3641aa56583b5a779a1b1f446bda73fd", 0x87}, 0x1, 0x0, 0x0, 0x40080}, 0xc010) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:53 executing program 4: socketpair(0x29, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="41a8ba10d538811a98af31c64483def574a5152e6257dfa781221ff7fa82002be0997a90f782e188b6670942ac8e030ecad0b9730f6738906169a9dc89c57d597a2447f1b58c376c90e464175f3a7c39caf61b43ed52f901ebd632bbac13f2d7cc31cc48aa616f1f90fa50894df6f21fd719485e8d2bfd3641aa56583b5a779a1b1f446bda73fd", 0x87}, 0x1, 0x0, 0x0, 0x40080}, 0xc010) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"85aa149967c0314910bc879e494e83fc"}}}}, 0xa0) 07:48:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x9}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f0000000140)=0x6) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_freeze_timeout', 0x68200, 0x8) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r5}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r5}}, 0xc) 07:48:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x810000000000000, 0x0}}, 0xfffffdef) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x10, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x5, 0x0, {0x0, 0x0, r0}}) 07:48:53 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, &(0x7f0000000140)=0x1, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20048060}, 0x4000) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:53 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x20e, 0x8}}, 0x20) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) socket$can_j1939(0x1d, 0x2, 0x7) [ 2307.987243][T25500] tipc: Started in network mode [ 2307.992168][T25500] tipc: Node identity , cluster identity 9 [ 2307.998077][T25500] tipc: Failed to obtain node identity [ 2308.003556][T25500] tipc: Enabling of bearer rejected, failed to enable media 07:48:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x100000, 0x0}}, 0xfffffdef) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, 0xfffffffffffffffe) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x1d1c, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:53 executing program 4: socketpair(0x29, 0xa, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)="41a8ba10d538811a98af31c64483def574a5152e6257dfa781221ff7fa82002be0997a90f782e188b6670942ac8e030ecad0b9730f6738906169a9dc89c57d597a2447f1b58c376c90e464175f3a7c39caf61b43ed52f901ebd632bbac13f2d7cc31cc48aa616f1f90fa50894df6f21fd719485e8d2bfd3641aa56583b5a779a1b1f446bda73fd", 0x87}, 0x1, 0x0, 0x0, 0x40080}, 0xc010) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xc00000000000000, 0x0}}, 0xfffffdef) 07:48:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1ff, @loopback, 0x9}, {0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r2}}, 0x48) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:53 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x100000, 0x0}}, 0xfffffdef) 07:48:53 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x20e, 0x8}}, 0x20) [ 2308.415715][T25518] ================================================================== [ 2308.423834][T25518] BUG: KCSAN: data-race in __percpu_counter_compare / percpu_counter_add_batch [ 2308.432872][T25518] [ 2308.435196][T25518] read-write to 0xffff888100139b50 of 8 bytes by task 25517 on cpu 0: [ 2308.443346][T25518] percpu_counter_add_batch+0xc9/0x140 [ 2308.448814][T25518] shmem_inode_acct_block+0x1ee/0x220 [ 2308.454191][T25518] shmem_get_folio_gfp+0x4ad/0xc30 [ 2308.459306][T25518] shmem_write_begin+0xa6/0x210 [ 2308.464168][T25518] generic_perform_write+0x1c9/0x410 [ 2308.469456][T25518] shmem_file_write_iter+0xc8/0xe0 [ 2308.474589][T25518] vfs_write+0x4ab/0x7d0 [ 2308.478843][T25518] ksys_write+0xeb/0x1a0 [ 2308.483092][T25518] __x64_sys_write+0x42/0x50 [ 2308.487683][T25518] do_syscall_64+0x41/0xc0 [ 2308.492108][T25518] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2308.498010][T25518] [ 2308.500332][T25518] read to 0xffff888100139b50 of 8 bytes by task 25518 on cpu 1: [ 2308.508049][T25518] __percpu_counter_compare+0x2b/0x1d0 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) [ 2308.513521][T25518] shmem_inode_acct_block+0xf6/0x220 [ 2308.518820][T25518] shmem_get_folio_gfp+0x4ad/0xc30 [ 2308.523953][T25518] shmem_write_begin+0xa6/0x210 [ 2308.528834][T25518] generic_perform_write+0x1c9/0x410 [ 2308.534127][T25518] shmem_file_write_iter+0xc8/0xe0 [ 2308.539253][T25518] vfs_write+0x4ab/0x7d0 [ 2308.543492][T25518] ksys_write+0xeb/0x1a0 [ 2308.547741][T25518] __x64_sys_write+0x42/0x50 [ 2308.552339][T25518] do_syscall_64+0x41/0xc0 [ 2308.556764][T25518] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2308.562665][T25518] 07:48:53 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) [ 2308.565001][T25518] value changed: 0x00000000000005a0 -> 0x00000000000005c0 [ 2308.572098][T25518] [ 2308.574416][T25518] Reported by Kernel Concurrency Sanitizer on: [ 2308.580566][T25518] CPU: 1 PID: 25518 Comm: syz-executor.0 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2308.590635][T25518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2308.600699][T25518] ================================================================== 07:48:53 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) 07:48:53 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) 07:48:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1ff, @loopback, 0x9}, {0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r2}}, 0x48) 07:48:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x1000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r2, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x844) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f2, 0x800, 0x70bd26, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x841}, 0x0) [ 2308.811262][T25544] tipc: Enabling of bearer rejected, already enabled 07:48:54 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x1, r7, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x20e, 0x8}}, 0x20) 07:48:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1ff, @loopback, 0x9}, {0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r2}}, 0x48) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2, 0x8}}, 0x20) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1ff, @loopback, 0x9}, {0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r2}}, 0x48) (async) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:54 executing program 4: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='}\x85]*[\x00', 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000580)='#[#\x00', r1) keyctl$reject(0x13, r0, 0x9, 0x9, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000580)='#[#\x00', r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)=':\x00') r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r1) r6 = request_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='%[\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r5, r6, r1, 0x1) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)={0x34, r4, 0x105, 0x0, 0x4000, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) 07:48:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x30}}, 0x4040) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x8, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}}, 0x20000811) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'xfrm0\x00'}}}}}, 0x34}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f0000000100)=0x2, 0x4) 07:48:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x2000000000000000, 0x0}}, 0xfffffdef) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xc00000000000000, 0x0}}, 0xfffffdef) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) [ 2308.901148][T25552] tipc: Bearer : already 2 bearers with priority 0 [ 2308.908621][T25552] tipc: Enabling of bearer rejected, cannot adjust to lower [ 2308.931864][T25551] tipc: Enabling of bearer rejected, failed to enable media 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) [ 2308.975515][T25551] tipc: Started in network mode [ 2308.980431][T25551] tipc: Node identity ee0940d48ec9, cluster identity 9 [ 2308.987300][T25551] tipc: Enabled bearer , priority 0 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) 07:48:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x30}}, 0x4040) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010027bd7000fbdbdf25010000800000000001410000001800170000000c0000000069623a70696d72"], 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x8, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}}, 0x20000811) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'xfrm0\x00'}}}}}, 0x34}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r4, 0x0, 0x2, &(0x7f0000000100)=0x2, 0x4) 07:48:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) syz_io_uring_setup(0x371e, &(0x7f0000000000)={0x0, 0xaa68, 0x55de27f34f42d6a0, 0x0, 0x383, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x6d2f, &(0x7f0000000180)={0x0, 0xae4e, 0x200, 0x1, 0x36b}, &(0x7f0000000100), &(0x7f0000000200)=0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = openat$cgroup_devices(r0, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, r3, &(0x7f0000000280)={0x40000000}, r4, 0x3, 0x0, 0x1}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x400800, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:54 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r8) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r9, 0x6}}, 0x10) 07:48:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xff01000000000000, 0x0}}, 0xfffffdef) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x10000000) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x10000000) 07:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x10000000) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x10000000) 07:48:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={r3, 0x1, r0, 0x80, 0x80000}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) [ 2309.271539][T25586] tipc: Enabling of bearer rejected, failed to enable media [ 2309.304287][T25586] tipc: Enabling of bearer rejected, already enabled 07:48:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={r3, 0x1, r0, 0x80, 0x80000}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) [ 2309.353921][T25594] tipc: Bearer : already 2 bearers with priority 0 [ 2309.361554][T25594] tipc: Enabling of bearer rejected, cannot adjust to lower [ 2309.458473][T25607] tipc: Bearer : already 2 bearers with priority 0 [ 2309.466088][T25607] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) syz_io_uring_setup(0x371e, &(0x7f0000000000)={0x0, 0xaa68, 0x55de27f34f42d6a0, 0x0, 0x383, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x6d2f, &(0x7f0000000180)={0x0, 0xae4e, 0x200, 0x1, 0x36b}, &(0x7f0000000100), &(0x7f0000000200)=0x0) (async, rerun: 32) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 32) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) r4 = openat$cgroup_devices(r0, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, r3, &(0x7f0000000280)={0x40000000}, r4, 0x3, 0x0, 0x1}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x400800, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={r3, 0x1, r0, 0x80, 0x80000}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:54 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) 07:48:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xffffffff00000000, 0x0}}, 0xfffffdef) 07:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) r6 = socket(0x18, 0x0, 0x99ef) syz_genetlink_get_family_id$tipc(&(0x7f0000000480), r6) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r7, 0x6}}, 0x10) 07:48:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000200)={r3, 0x469d, 0x800}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:54 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x10000000) [ 2309.541726][T25613] tipc: Bearer : already 2 bearers with priority 0 [ 2309.549344][T25613] tipc: Enabling of bearer rejected, cannot adjust to lower 07:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) syz_io_uring_setup(0x371e, &(0x7f0000000000)={0x0, 0xaa68, 0x55de27f34f42d6a0, 0x0, 0x383, 0x0, r0}, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x6d2f, &(0x7f0000000180)={0x0, 0xae4e, 0x200, 0x1, 0x36b}, &(0x7f0000000100), &(0x7f0000000200)=0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) (async) r4 = openat$cgroup_devices(r0, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, r3, &(0x7f0000000280)={0x40000000}, r4, 0x3, 0x0, 0x1}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x400800, 0x0) openat$cgroup_devices(r5, &(0x7f0000000380)='devices.deny\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:54 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0xc000000, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:54 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xffffffffffff0700, 0x0}}, 0xfffffdef) 07:48:55 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) socket(0x18, 0x0, 0x99ef) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r6, 0x6}}, 0x10) 07:48:55 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (fail_nth: 1) 07:48:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) [ 2310.119348][ T5105] tipc: Node number set to 1623212244 [ 2310.156641][T25670] FAULT_INJECTION: forcing a failure. [ 2310.156641][T25670] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2310.169721][T25670] CPU: 0 PID: 25670 Comm: syz-executor.3 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2310.179852][T25670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2310.190012][T25670] Call Trace: [ 2310.193284][T25670] [ 2310.196219][T25670] dump_stack_lvl+0xda/0x130 [ 2310.200853][T25670] dump_stack+0x15/0x20 [ 2310.205057][T25670] should_fail_ex+0x21f/0x230 [ 2310.209741][T25670] should_fail+0xb/0x10 [ 2310.213950][T25670] should_fail_usercopy+0x1a/0x20 [ 2310.218973][T25670] _copy_to_user+0x1e/0x90 [ 2310.223436][T25670] simple_read_from_buffer+0xa0/0x110 [ 2310.228861][T25670] proc_fail_nth_read+0xfc/0x140 [ 2310.233810][T25670] ? proc_fault_inject_write+0x210/0x210 [ 2310.239485][T25670] vfs_read+0x19f/0x5c0 [ 2310.243643][T25670] ? __fget_files+0x1c4/0x200 [ 2310.248319][T25670] ? mutex_lock+0xd/0x30 [ 2310.252577][T25670] ksys_read+0xeb/0x1a0 [ 2310.256808][T25670] __x64_sys_read+0x42/0x50 [ 2310.261318][T25670] do_syscall_64+0x41/0xc0 [ 2310.265764][T25670] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2310.271692][T25670] RIP: 0033:0x7f5a81b6a78c [ 2310.276213][T25670] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 2310.295857][T25670] RSP: 002b:00007f5a80eee0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2310.304391][T25670] RAX: ffffffffffffffda RBX: 00007f5a81c8af80 RCX: 00007f5a81b6a78c [ 2310.312375][T25670] RDX: 000000000000000f RSI: 00007f5a80eee130 RDI: 0000000000000004 07:48:55 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r6, 0x6}}, 0x10) 07:48:55 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0xffffffffffffff7f, 0x0}}, 0xfffffdef) 07:48:55 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f0000000000)=0x1, 0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) [ 2310.320382][T25670] RBP: 00007f5a80eee120 R08: 0000000000000000 R09: 0000000010000000 [ 2310.328558][T25670] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 2310.336535][T25670] R13: 000000000000000b R14: 00007f5a81c8af80 R15: 00007ffe402c7538 [ 2310.344590][T25670] 07:48:55 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:55 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r5, 0x6}}, 0x10) 07:48:55 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) 07:48:55 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1002, 0x2, 0x13, r0, 0x10000000) 07:48:55 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:55 executing program 5: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x20ffe000, 0x2, 0x13, r0, 0x10000000) 07:48:55 executing program 5: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x7ffffffff000, 0x2, 0x13, r0, 0x10000000) 07:48:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x408) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"2bde9469e6ef3a54940117025c86fb33", 0x0, 0x0, {0x0, 0x81}, {0x8000000000000001, 0x2}, 0x1, [0x4, 0x2, 0x9, 0x8, 0x80000000, 0x2, 0x4, 0x7fffffffffffffff, 0x55, 0x100, 0x2, 0x1, 0x4, 0x4, 0xb0, 0x1]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffffffffff01}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x800) 07:48:55 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r5, 0x6}}, 0x10) 07:48:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 07:48:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x13, r0, 0x10000000) 07:48:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x408) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"2bde9469e6ef3a54940117025c86fb33", 0x0, 0x0, {0x0, 0x81}, {0x8000000000000001, 0x2}, 0x1, [0x4, 0x2, 0x9, 0x8, 0x80000000, 0x2, 0x4, 0x7fffffffffffffff, 0x55, 0x100, 0x2, 0x1, 0x4, 0x4, 0xb0, 0x1]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffffffffff01}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x800) 07:48:55 executing program 5: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:55 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0xfffffdef) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000002) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x20080, 0x408) io_uring_setup(0xc28, &(0x7f0000000000)={0x0, 0x6ec4, 0x200, 0x1, 0xc5, 0x0, r0}) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x80010, r0, 0x10000000) 07:48:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x408) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000040)={"2bde9469e6ef3a54940117025c86fb33", 0x0, 0x0, {0x0, 0x81}, {0x8000000000000001, 0x2}, 0x1, [0x4, 0x2, 0x9, 0x8, 0x80000000, 0x2, 0x4, 0x7fffffffffffffff, 0x55, 0x100, 0x2, 0x1, 0x4, 0x4, 0xb0, 0x1]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x50, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, '\x00', 0x37}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffffffffff01}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x800) [ 2310.845643][ T27] audit: type=1400 audit(1693986536.009:389): avc: denied { execute } for pid=25733 comm="syz-executor.3" path=2F6465762F6273672F2335343134202864656C6574656429 dev="devtmpfs" ino=5414 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=file permissive=1 07:48:56 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r5, 0x6}}, 0x10) 07:48:56 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x4}}, 0xfffffdef) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0x6}}, 0x20) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x20080, 0x408) io_uring_setup(0xc28, &(0x7f0000000000)={0x0, 0x6ec4, 0x200, 0x1, 0xc5, 0x0, r0}) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x80010, r0, 0x10000000) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x20080, 0x408) io_uring_setup(0xc28, &(0x7f0000000000)={0x0, 0x6ec4, 0x200, 0x1, 0xc5, 0x0, r0}) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x80010, r0, 0x10000000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x20080, 0x408) (async) io_uring_setup(0xc28, &(0x7f0000000000)={0x0, 0x6ec4, 0x200, 0x1, 0xc5, 0x0, r0}) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x80010, r0, 0x10000000) (async) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) write$qrtrtun(r1, &(0x7f0000000040)="a395cadd784b079804924b47f031905a61ee7d6df130c6fe1c6c99e6904d7a6dfc97db99e609b21a62bffcfe69189bd75916c5b31f71a52daaf1a4088423242de84e049f91e8e7bad8a7429fef62a3d9bfb4c91b02a4a0e05d6db7f78454582e8b5afce99c1a62522cd4af89e73de796d8", 0x71) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 07:48:56 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:48:56 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x5}}, 0xfffffdef) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) write$qrtrtun(r1, &(0x7f0000000040)="a395cadd784b079804924b47f031905a61ee7d6df130c6fe1c6c99e6904d7a6dfc97db99e609b21a62bffcfe69189bd75916c5b31f71a52daaf1a4088423242de84e049f91e8e7bad8a7429fef62a3d9bfb4c91b02a4a0e05d6db7f78454582e8b5afce99c1a62522cd4af89e73de796d8", 0x71) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 07:48:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0x6}}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0x6}}, 0x20) (async) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) write$qrtrtun(r1, &(0x7f0000000040)="a395cadd784b079804924b47f031905a61ee7d6df130c6fe1c6c99e6904d7a6dfc97db99e609b21a62bffcfe69189bd75916c5b31f71a52daaf1a4088423242de84e049f91e8e7bad8a7429fef62a3d9bfb4c91b02a4a0e05d6db7f78454582e8b5afce99c1a62522cd4af89e73de796d8", 0x71) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000000)={"8ff6ca1cfedc10d958a20f6698b394e5", 0x0, 0x0, {0x0, 0x9}, {0x5, 0x40}, 0x5, [0xe3, 0x9, 0xbd0, 0x2, 0x6, 0x5, 0x100000001, 0x60000, 0x100, 0x7fff, 0x7, 0x20, 0x6, 0x693, 0x7ff, 0xeec5]}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x10000000) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, 0x0, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0x6}}, 0x20) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000000)={"8ff6ca1cfedc10d958a20f6698b394e5", 0x0, 0x0, {0x0, 0x9}, {0x5, 0x40}, 0x5, [0xe3, 0x9, 0xbd0, 0x2, 0x6, 0x5, 0x100000001, 0x60000, 0x100, 0x7fff, 0x7, 0x20, 0x6, 0x693, 0x7ff, 0xeec5]}) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x10000000) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:56 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x6}}, 0xfffffdef) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000000)={"8ff6ca1cfedc10d958a20f6698b394e5", 0x0, 0x0, {0x0, 0x9}, {0x5, 0x40}, 0x5, [0xe3, 0x9, 0xbd0, 0x2, 0x6, 0x5, 0x100000001, 0x60000, 0x100, 0x7fff, 0x7, 0x20, 0x6, 0x693, 0x7ff, 0xeec5]}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x10000000) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x0, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:48:56 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x8}}, 0xfffffdef) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r5, 0x6}}, 0x10) 07:48:56 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:56 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:48:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = syz_io_uring_setup(0x1f17, &(0x7f0000000000)={0x0, 0x4304, 0x20, 0x3, 0x3ac, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x110, r1, 0x10000000) kexec_load(0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="5d7565ddbbb9eb500a32187d2598b9cd99967de55aa92f4a6d79d7494a8bb0c51309d3ef857b3496143985a7be92cdb3eaf5760150ce23e0f8009c692ed26767a44117f8bb498a317c45edbf41c64b24f7e1241841cbec0d95b6df70e051e89aceb8628d647277d2d54a13917904e8257d823f1be6fb5c5b353e7ba586035b6f0e33f08df994b08ef78af9881a09cbabee5dab89ab", 0x95, 0x8, 0x1}, {&(0x7f0000000280)="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", 0x1000, 0x4, 0x6}], 0x320000) 07:48:56 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) (async) 07:48:56 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x20}}, 0x10) 07:48:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 07:48:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x408) connect$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x1}, 0xff}, 0x18) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e20, 0x1a, @remote, 0x5}, {0xa, 0x4e22, 0x10000, @empty, 0x3}, 0xffffffffffffffff, {[0xfaba, 0x7, 0x74af, 0x20, 0x1, 0x0, 0x8001, 0x6]}}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0xda30, @loopback, 0xe2eb}}}, 0x38) openat$cgroup_devices(r0, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) 07:48:57 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0xc}}, 0xfffffdef) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = syz_io_uring_setup(0x1f17, &(0x7f0000000000)={0x0, 0x4304, 0x20, 0x3, 0x3ac, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x110, r1, 0x10000000) kexec_load(0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="5d7565ddbbb9eb500a32187d2598b9cd99967de55aa92f4a6d79d7494a8bb0c51309d3ef857b3496143985a7be92cdb3eaf5760150ce23e0f8009c692ed26767a44117f8bb498a317c45edbf41c64b24f7e1241841cbec0d95b6df70e051e89aceb8628d647277d2d54a13917904e8257d823f1be6fb5c5b353e7ba586035b6f0e33f08df994b08ef78af9881a09cbabee5dab89ab", 0x95, 0x8, 0x1}, {&(0x7f0000000280)="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", 0x1000, 0x4, 0x6}], 0x320000) 07:48:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 07:48:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x13, r0, 0x10000000) 07:48:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x408) connect$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x1}, 0xff}, 0x18) (async) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e20, 0x1a, @remote, 0x5}, {0xa, 0x4e22, 0x10000, @empty, 0x3}, 0xffffffffffffffff, {[0xfaba, 0x7, 0x74af, 0x20, 0x1, 0x0, 0x8001, 0x6]}}, 0x5c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0xda30, @loopback, 0xe2eb}}}, 0x38) (async) openat$cgroup_devices(r0, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = syz_io_uring_setup(0x1f17, &(0x7f0000000000)={0x0, 0x4304, 0x20, 0x3, 0x3ac, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x110, r1, 0x10000000) kexec_load(0x1, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="5d7565ddbbb9eb500a32187d2598b9cd99967de55aa92f4a6d79d7494a8bb0c51309d3ef857b3496143985a7be92cdb3eaf5760150ce23e0f8009c692ed26767a44117f8bb498a317c45edbf41c64b24f7e1241841cbec0d95b6df70e051e89aceb8628d647277d2d54a13917904e8257d823f1be6fb5c5b353e7ba586035b6f0e33f08df994b08ef78af9881a09cbabee5dab89ab", 0x95, 0x8, 0x1}, {&(0x7f0000000280)="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", 0x1000, 0x4, 0x6}], 0x320000) 07:48:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 07:48:57 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:48:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0x10) 07:48:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:48:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x408) connect$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x1}, 0xff}, 0x18) (async) setsockopt$MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e20, 0x1a, @remote, 0x5}, {0xa, 0x4e22, 0x10000, @empty, 0x3}, 0xffffffffffffffff, {[0xfaba, 0x7, 0x74af, 0x20, 0x1, 0x0, 0x8001, 0x6]}}, 0x5c) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e21, 0xda30, @loopback, 0xe2eb}}}, 0x38) (async) openat$cgroup_devices(r0, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x8001) 07:48:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r6, 0x6}}, 0x10) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) (async) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x8001) 07:48:57 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x10}}, 0xfffffdef) 07:48:57 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x8001) (async) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x8001) 07:48:57 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) (async) 07:48:57 executing program 3: write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x6, @private2={0xfc, 0x2, '\x00', 0xc}}, {0xa, 0x4e20, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0xffffff57}, 0xffffffffffffffff, 0x248f}}, 0x48) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e20, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x38) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000001c0)={0x4, 0x8}, 0x10) r3 = socket(0x15, 0x3, 0x7) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0xfffffffc, @mcast2, 0x7fff}, {0xa, 0x4e20, 0xfffffffa, @mcast1, 0x3}, 0x1, {[0x8dbb, 0x1, 0x1000, 0x3, 0x5, 0x7, 0x8, 0x7]}}, 0x5c) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"53dabea1d2d6b2bbbc1e8ec8a6fdb0d9", r4, 0x0, {0x6, 0x8}, {0x4, 0x3}, 0x0, [0xfffffffffffffffc, 0x6, 0x8001, 0x9d1, 0xfffffffffffffffc, 0x4009, 0x9, 0x2, 0x8003, 0xff, 0x4, 0x9, 0x1000, 0x2, 0x2, 0x477c]}) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x10000000) 07:48:57 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) 07:48:57 executing program 3: write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x6, @private2={0xfc, 0x2, '\x00', 0xc}}, {0xa, 0x4e20, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0xffffff57}, 0xffffffffffffffff, 0x248f}}, 0x48) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e20, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x38) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000001c0)={0x4, 0x8}, 0x10) socket(0x15, 0x3, 0x7) (async) r3 = socket(0x15, 0x3, 0x7) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0xfffffffc, @mcast2, 0x7fff}, {0xa, 0x4e20, 0xfffffffa, @mcast1, 0x3}, 0x1, {[0x8dbb, 0x1, 0x1000, 0x3, 0x5, 0x7, 0x8, 0x7]}}, 0x5c) (async) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0xfffffffc, @mcast2, 0x7fff}, {0xa, 0x4e20, 0xfffffffa, @mcast1, 0x3}, 0x1, {[0x8dbb, 0x1, 0x1000, 0x3, 0x5, 0x7, 0x8, 0x7]}}, 0x5c) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"53dabea1d2d6b2bbbc1e8ec8a6fdb0d9", r4, 0x0, {0x6, 0x8}, {0x4, 0x3}, 0x0, [0xfffffffffffffffc, 0x6, 0x8001, 0x9d1, 0xfffffffffffffffc, 0x4009, 0x9, 0x2, 0x8003, 0xff, 0x4, 0x9, 0x1000, 0x2, 0x2, 0x477c]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"53dabea1d2d6b2bbbc1e8ec8a6fdb0d9", r4, 0x0, {0x6, 0x8}, {0x4, 0x3}, 0x0, [0xfffffffffffffffc, 0x6, 0x8001, 0x9d1, 0xfffffffffffffffc, 0x4009, 0x9, 0x2, 0x8003, 0xff, 0x4, 0x9, 0x1000, 0x2, 0x2, 0x477c]}) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x10000000) 07:48:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0x10) (fail_nth: 1) 07:48:57 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) [ 2312.417810][T25931] FAULT_INJECTION: forcing a failure. [ 2312.417810][T25931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2312.430946][T25931] CPU: 1 PID: 25931 Comm: syz-executor.4 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2312.441036][T25931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2312.451100][T25931] Call Trace: [ 2312.454398][T25931] [ 2312.457335][T25931] dump_stack_lvl+0xda/0x130 [ 2312.462063][T25931] dump_stack+0x15/0x20 07:48:57 executing program 3: write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x6, @private2={0xfc, 0x2, '\x00', 0xc}}, {0xa, 0x4e20, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0xffffff57}, 0xffffffffffffffff, 0x248f}}, 0x48) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e20, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x38) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000001c0)={0x4, 0x8}, 0x10) (async) r3 = socket(0x15, 0x3, 0x7) setsockopt$MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0xfffffffc, @mcast2, 0x7fff}, {0xa, 0x4e20, 0xfffffffa, @mcast1, 0x3}, 0x1, {[0x8dbb, 0x1, 0x1000, 0x3, 0x5, 0x7, 0x8, 0x7]}}, 0x5c) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000300)={"53dabea1d2d6b2bbbc1e8ec8a6fdb0d9", r4, 0x0, {0x6, 0x8}, {0x4, 0x3}, 0x0, [0xfffffffffffffffc, 0x6, 0x8001, 0x9d1, 0xfffffffffffffffc, 0x4009, 0x9, 0x2, 0x8003, 0xff, 0x4, 0x9, 0x1000, 0x2, 0x2, 0x477c]}) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r2, 0x10000000) [ 2312.466265][T25931] should_fail_ex+0x21f/0x230 [ 2312.470945][T25931] should_fail+0xb/0x10 [ 2312.475225][T25931] should_fail_usercopy+0x1a/0x20 [ 2312.480258][T25931] copy_page_from_iter_atomic+0x21c/0xcf0 [ 2312.486008][T25931] ? shmem_xattr_handler_get+0x41/0x50 [ 2312.491561][T25931] ? shmem_get_offset_ctx+0x20/0x20 [ 2312.496921][T25931] ? shmem_write_begin+0xa6/0x210 [ 2312.501997][T25931] ? shmem_write_begin+0x16d/0x210 [ 2312.507216][T25931] generic_perform_write+0x20c/0x410 [ 2312.512565][T25931] shmem_file_write_iter+0xc8/0xe0 [ 2312.517747][T25931] vfs_write+0x4ab/0x7d0 [ 2312.521998][T25931] ksys_write+0xeb/0x1a0 [ 2312.526244][T25931] __x64_sys_write+0x42/0x50 [ 2312.530964][T25931] do_syscall_64+0x41/0xc0 [ 2312.535412][T25931] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2312.541313][T25931] RIP: 0033:0x7ff3a906eae9 [ 2312.545783][T25931] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:48:57 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={0xffffffffffffffff, 0x63}, 0xc) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000580)={"7998dbec99abdb1d318f0c52b3ae6937", 0x0, 0x0, {0x1, 0x400}, {0xec7d, 0x1c0}, 0x2c7, [0x8a, 0x64, 0x28f, 0x5db, 0x228, 0x4, 0x5, 0x8, 0x1, 0x7, 0x11, 0x27235eff, 0x5, 0x0, 0x3af0968b, 0x4]}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r5, 0x0, 0x1, 0x0, 0x0) setsockopt$MRT6_DEL_MFC(r5, 0x29, 0xcd, &(0x7f0000000500)={{0xa, 0x4e21, 0x0, @mcast2, 0x3}, {0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0xc325}, 0x0, {[0x3, 0xfffffff7, 0x8, 0x3, 0x80, 0x8000, 0x1, 0x7]}}, 0x5c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r6, 0x6}}, 0x10) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x10000000) 07:48:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472101, 0x408) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "c1da56c75634bb9bcfdead6ace8c3c471f4c3070f52b0df63b8e20b511445f8f439cde648de6c7dd8065912bbc62c1ecf638963d5d6624afddfbf3960ba712b853e33da61ea38021dec3545ae355447f955d0cad20fc0f6daaaeeedb7cf0438ca606a33e0c22076dc9634570133a4315c1e36d8eb1dc893567b613e03a05116a732f375c686f9c8a470ea4f6fa55b002c8e9cca7013888ef110f03970e8697174270248f4a28e0645694f41d317d1b62a5f65b13a1e0e7538e2cda8a7f4a72a362072b68890765f7d5823c41cfa60c66697f97251ddfc12a8d5e0d54e6642b59d82189ff5c6594602fe082278126efbbdced7bebb6b0842d312a3dd3232fb7c1", 0x2, 0x1, 0x2, 0x5, 0x4, 0x0, 0x6}, r2}}, 0x120) 07:48:57 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x204}}, 0xfffffdef) [ 2312.565489][T25931] RSP: 002b:00007ff3a83f10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2312.573965][T25931] RAX: ffffffffffffffda RBX: 00007ff3a918df80 RCX: 00007ff3a906eae9 [ 2312.582204][T25931] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 2312.590179][T25931] RBP: 00007ff3a83f1120 R08: 0000000000000000 R09: 0000000000000000 [ 2312.598161][T25931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2312.606171][T25931] R13: 000000000000000b R14: 00007ff3a918df80 R15: 00007ffd89d29098 [ 2312.614330][T25931] 07:48:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0x10) (fail_nth: 2) 07:48:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x10000000) [ 2312.679989][T25954] FAULT_INJECTION: forcing a failure. [ 2312.679989][T25954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2312.693081][T25954] CPU: 0 PID: 25954 Comm: syz-executor.4 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2312.703150][T25954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2312.713199][T25954] Call Trace: [ 2312.716475][T25954] [ 2312.719406][T25954] dump_stack_lvl+0xda/0x130 [ 2312.724003][T25954] dump_stack+0x15/0x20 [ 2312.728163][T25954] should_fail_ex+0x21f/0x230 [ 2312.732845][T25954] should_fail+0xb/0x10 [ 2312.737000][T25954] should_fail_usercopy+0x1a/0x20 [ 2312.742076][T25954] _copy_to_user+0x1e/0x90 [ 2312.746500][T25954] simple_read_from_buffer+0xa0/0x110 [ 2312.751878][T25954] proc_fail_nth_read+0xfc/0x140 [ 2312.756914][T25954] ? proc_fault_inject_write+0x210/0x210 [ 2312.762565][T25954] vfs_read+0x19f/0x5c0 [ 2312.766732][T25954] ? __fget_files+0x1c4/0x200 [ 2312.771417][T25954] ? mutex_lock+0xd/0x30 [ 2312.775685][T25954] ksys_read+0xeb/0x1a0 [ 2312.779853][T25954] __x64_sys_read+0x42/0x50 [ 2312.784425][T25954] do_syscall_64+0x41/0xc0 [ 2312.788852][T25954] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2312.794810][T25954] RIP: 0033:0x7ff3a906d78c [ 2312.799235][T25954] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 2312.818877][T25954] RSP: 002b:00007ff3a83f10c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 07:48:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472101, 0x408) (async, rerun: 64) r1 = socket$can_j1939(0x1d, 0x2, 0x7) (rerun: 64) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "c1da56c75634bb9bcfdead6ace8c3c471f4c3070f52b0df63b8e20b511445f8f439cde648de6c7dd8065912bbc62c1ecf638963d5d6624afddfbf3960ba712b853e33da61ea38021dec3545ae355447f955d0cad20fc0f6daaaeeedb7cf0438ca606a33e0c22076dc9634570133a4315c1e36d8eb1dc893567b613e03a05116a732f375c686f9c8a470ea4f6fa55b002c8e9cca7013888ef110f03970e8697174270248f4a28e0645694f41d317d1b62a5f65b13a1e0e7538e2cda8a7f4a72a362072b68890765f7d5823c41cfa60c66697f97251ddfc12a8d5e0d54e6642b59d82189ff5c6594602fe082278126efbbdced7bebb6b0842d312a3dd3232fb7c1", 0x2, 0x1, 0x2, 0x5, 0x4, 0x0, 0x6}, r2}}, 0x120) 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (rerun: 64) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x10000000) 07:48:58 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r3, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0x10) [ 2312.827299][T25954] RAX: ffffffffffffffda RBX: 00007ff3a918df80 RCX: 00007ff3a906d78c [ 2312.835270][T25954] RDX: 000000000000000f RSI: 00007ff3a83f1130 RDI: 0000000000000004 [ 2312.843238][T25954] RBP: 00007ff3a83f1120 R08: 0000000000000000 R09: 0000000000000000 [ 2312.851242][T25954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2312.859216][T25954] R13: 000000000000000b R14: 00007ff3a918df80 R15: 00007ffd89d29098 [ 2312.867205][T25954] 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x7, 0x8}, 0x10) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa02}, 0x10) 07:48:58 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472101, 0x408) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "c1da56c75634bb9bcfdead6ace8c3c471f4c3070f52b0df63b8e20b511445f8f439cde648de6c7dd8065912bbc62c1ecf638963d5d6624afddfbf3960ba712b853e33da61ea38021dec3545ae355447f955d0cad20fc0f6daaaeeedb7cf0438ca606a33e0c22076dc9634570133a4315c1e36d8eb1dc893567b613e03a05116a732f375c686f9c8a470ea4f6fa55b002c8e9cca7013888ef110f03970e8697174270248f4a28e0645694f41d317d1b62a5f65b13a1e0e7538e2cda8a7f4a72a362072b68890765f7d5823c41cfa60c66697f97251ddfc12a8d5e0d54e6642b59d82189ff5c6594602fe082278126efbbdced7bebb6b0842d312a3dd3232fb7c1", 0x2, 0x1, 0x2, 0x5, 0x4, 0x0, 0x6}, r2}}, 0x120) 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x90711c004fad6648, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:58 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472101, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472101, 0x408) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x2, 0x1, 0x2, 0x5, 0x4, 0x0, 0x6}, r2}}, 0x120) 07:48:58 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x402}}, 0xfffffdef) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa05}, 0x10) 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x90711c004fad6648, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa06}, 0x10) 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x90711c004fad6648, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:58 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa08}, 0x10) 07:48:58 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x169000, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="d2d3b7f522cd968660b4570b7f7e6188c59019b0e4f4b35f9a262ab3bb3e5ee0e413749eac929486ace4a60196a44d67edab7baeb5d911e0e7512e6788d0bd50d923e59d32693bc6271691a41bcc92d296a87bb5e6", 0x55}}, 0x8000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/radio_si470x_usb', 0x200, 0x112) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, r1, 0x26}, 0x10) 07:48:58 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x472101, 0x408) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x2, 0x1, 0x2, 0x5, 0x4, 0x0, 0x6}, r2}}, 0x120) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa10}, 0x10) 07:48:58 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x169000, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="d2d3b7f522cd968660b4570b7f7e6188c59019b0e4f4b35f9a262ab3bb3e5ee0e413749eac929486ace4a60196a44d67edab7baeb5d911e0e7512e6788d0bd50d923e59d32693bc6271691a41bcc92d296a87bb5e6", 0x55}}, 0x8000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x169000, 0x0) (async) sendmsg$can_j1939(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="d2d3b7f522cd968660b4570b7f7e6188c59019b0e4f4b35f9a262ab3bb3e5ee0e413749eac929486ace4a60196a44d67edab7baeb5d911e0e7512e6788d0bd50d923e59d32693bc6271691a41bcc92d296a87bb5e6", 0x55}}, 0x8000) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) [ 2313.324488][T26001] ================================================================== [ 2313.332590][T26001] BUG: KCSAN: data-race in __percpu_counter_compare / percpu_counter_add_batch [ 2313.341711][T26001] [ 2313.344023][T26001] read-write to 0xffff888100139b50 of 8 bytes by task 26014 on cpu 0: [ 2313.352170][T26001] percpu_counter_add_batch+0xc9/0x140 [ 2313.357631][T26001] shmem_inode_acct_block+0x1ee/0x220 [ 2313.363012][T26001] shmem_get_folio_gfp+0x4ad/0xc30 [ 2313.368134][T26001] shmem_write_begin+0xa6/0x210 [ 2313.372993][T26001] generic_perform_write+0x1c9/0x410 [ 2313.378279][T26001] shmem_file_write_iter+0xc8/0xe0 [ 2313.383394][T26001] vfs_write+0x4ab/0x7d0 [ 2313.387637][T26001] ksys_write+0xeb/0x1a0 [ 2313.391872][T26001] __x64_sys_write+0x42/0x50 [ 2313.396466][T26001] do_syscall_64+0x41/0xc0 [ 2313.400894][T26001] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2313.406789][T26001] [ 2313.409115][T26001] read to 0xffff888100139b50 of 8 bytes by task 26001 on cpu 1: [ 2313.416748][T26001] __percpu_counter_compare+0x2b/0x1d0 [ 2313.422218][T26001] shmem_inode_acct_block+0xf6/0x220 [ 2313.427519][T26001] shmem_get_folio_gfp+0x4ad/0xc30 [ 2313.432637][T26001] shmem_write_begin+0xa6/0x210 [ 2313.437494][T26001] generic_perform_write+0x1c9/0x410 [ 2313.442781][T26001] shmem_file_write_iter+0xc8/0xe0 [ 2313.447903][T26001] vfs_write+0x4ab/0x7d0 [ 2313.452155][T26001] ksys_write+0xeb/0x1a0 [ 2313.456411][T26001] __x64_sys_write+0x42/0x50 [ 2313.461020][T26001] do_syscall_64+0x41/0xc0 [ 2313.465448][T26001] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2313.471353][T26001] [ 2313.473675][T26001] value changed: 0x00000000000022a8 -> 0x00000000000022c8 [ 2313.480787][T26001] [ 2313.483102][T26001] Reported by Kernel Concurrency Sanitizer on: [ 2313.489244][T26001] CPU: 1 PID: 26001 Comm: syz-executor.1 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2313.499310][T26001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2313.509360][T26001] ================================================================== 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0x10) 07:48:58 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x169000, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)="d2d3b7f522cd968660b4570b7f7e6188c59019b0e4f4b35f9a262ab3bb3e5ee0e413749eac929486ace4a60196a44d67edab7baeb5d911e0e7512e6788d0bd50d923e59d32693bc6271691a41bcc92d296a87bb5e6", 0x55}}, 0x8000) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:58 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, "f6c7d8", "732adb41bfab3ad8c846b1ab4c6227effdb37db5bde732130ce98fa6bed4f16f241d5572064f0f5baf489920aff2fdd88a23d891095433cb68216ae385608a64cbddd3d6621bd020da86cb0a63aaba0f6424d3f224ef5dd1a4a2fef6b3f3286cbda3b7c60d546c8ac644615943dd433a851351caf725ad060a8b9e17b171ccf12097eb9b843e034061b584cc9973f1589ed0858e9336f8b7178b9318a4cfb19d2afb7b304c5e9d4cd80df35fbbac5a9935412f9b4f0c53451d68fcb613ad5acbac205905dbca8325cf2e1f050d6bb8868643f95447d4a27a3a947f1b10397b772e0d117262f3126c753ebb414794bb21128200"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) 07:48:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 1) [ 2313.582153][T26020] FAULT_INJECTION: forcing a failure. [ 2313.582153][T26020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2313.595274][T26020] CPU: 1 PID: 26020 Comm: syz-executor.5 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2313.605343][T26020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2313.615397][T26020] Call Trace: [ 2313.618683][T26020] [ 2313.621682][T26020] dump_stack_lvl+0xda/0x130 [ 2313.626283][T26020] dump_stack+0x15/0x20 07:48:58 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x406}}, 0xfffffdef) [ 2313.630484][T26020] should_fail_ex+0x21f/0x230 [ 2313.635167][T26020] should_fail+0xb/0x10 [ 2313.639333][T26020] should_fail_usercopy+0x1a/0x20 [ 2313.644440][T26020] _copy_from_user+0x1e/0xd0 [ 2313.649040][T26020] copy_msghdr_from_user+0x54/0x2a0 [ 2313.654253][T26020] __sys_sendmsg+0x17d/0x270 [ 2313.658977][T26020] __x64_sys_sendmsg+0x46/0x50 [ 2313.663778][T26020] do_syscall_64+0x41/0xc0 [ 2313.668205][T26020] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2313.674102][T26020] RIP: 0033:0x7fb457953ae9 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6401010101000000700000000000000000000000000000000000000000000000ac1414000000000000000000000000000000000000000000000000000000007ff5544b00000000000000000000000000ac1e0000000000000000000000000000e00000020000000000000000000000007f00000100"/128]}) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x3, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6401010101000000700000000000000000000000000000000000000000000000ac1414000000000000000000000000000000000000000000000000000000007ff5544b00000000000000000000000000ac1e0000000000000000000000000000e00000020000000000000000000000007f00000100"/128]}) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) [ 2313.678519][T26020] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2313.698178][T26020] RSP: 002b:00007fb456cd60c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2313.706595][T26020] RAX: ffffffffffffffda RBX: 00007fb457a72f80 RCX: 00007fb457953ae9 [ 2313.714570][T26020] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 2313.722561][T26020] RBP: 00007fb456cd6120 R08: 0000000000000000 R09: 0000000000000000 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x3, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6401010101000000700000000000000000000000000000000000000000000000ac1414000000000000000000000000000000000000000000000000000000007ff5544b00000000000000000000000000ac1e0000000000000000000000000000e00000020000000000000000000000007f00000100"/128]}) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6401010101000000700000000000000000000000000000000000000000000000ac1414000000000000000000000000000000000000000000000000000000007ff5544b00000000000000000000000000ac1e0000000000000000000000000000e00000020000000000000000000000007f00000100"/128]}) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:48:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/radio_si470x_usb', 0x200, 0x112) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, r1, 0x26}, 0x10) 07:48:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 2) 07:48:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) [ 2313.730546][T26020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2313.738566][T26020] R13: 000000000000000b R14: 00007fb457a72f80 R15: 00007ffea0f410f8 [ 2313.746545][T26020] 07:48:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40044) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/rsi_usb', 0x103, 0xc2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) setsockopt$MRT6_DEL_MIF(r2, 0x29, 0xcb, &(0x7f0000000140)={0x0, 0x0, 0x80, r4, 0x8000}, 0xc) [ 2313.778813][T26039] FAULT_INJECTION: forcing a failure. [ 2313.778813][T26039] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.791485][T26039] CPU: 1 PID: 26039 Comm: syz-executor.5 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2313.801599][T26039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2313.811660][T26039] Call Trace: [ 2313.814954][T26039] [ 2313.817888][T26039] dump_stack_lvl+0xda/0x130 [ 2313.822490][T26039] dump_stack+0x15/0x20 07:48:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40044) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/rsi_usb', 0x103, 0xc2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) setsockopt$MRT6_DEL_MIF(r2, 0x29, 0xcb, &(0x7f0000000140)={0x0, 0x0, 0x80, r4, 0x8000}, 0xc) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40044) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/rsi_usb', 0x103, 0xc2) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) (async) setsockopt$MRT6_DEL_MIF(r2, 0x29, 0xcb, &(0x7f0000000140)={0x0, 0x0, 0x80, r4, 0x8000}, 0xc) (async) 07:48:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40044) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/rsi_usb', 0x103, 0xc2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) (async) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180)=0x2, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) setsockopt$MRT6_DEL_MIF(r2, 0x29, 0xcb, &(0x7f0000000140)={0x0, 0x0, 0x80, r4, 0x8000}, 0xc) [ 2313.826686][T26039] should_fail_ex+0x21f/0x230 [ 2313.831370][T26039] __should_failslab+0x92/0xa0 [ 2313.836153][T26039] should_failslab+0x9/0x20 [ 2313.840664][T26039] slab_pre_alloc_hook+0x38/0x180 [ 2313.845741][T26039] kmem_cache_alloc_node+0x54/0x240 [ 2313.850949][T26039] ? __alloc_skb+0x109/0x2e0 [ 2313.855561][T26039] __alloc_skb+0x109/0x2e0 [ 2313.860054][T26039] netlink_sendmsg+0x483/0x770 [ 2313.864832][T26039] ? netlink_getsockopt+0x3e0/0x3e0 [ 2313.870084][T26039] ____sys_sendmsg+0x37c/0x4d0 [ 2313.874856][T26039] __sys_sendmsg+0x1e9/0x270 [ 2313.879499][T26039] __x64_sys_sendmsg+0x46/0x50 [ 2313.884302][T26039] do_syscall_64+0x41/0xc0 [ 2313.888826][T26039] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2313.894811][T26039] RIP: 0033:0x7fb457953ae9 [ 2313.899221][T26039] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2313.918900][T26039] RSP: 002b:00007fb456cd60c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:48:59 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) 07:48:59 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x500}}, 0xfffffdef) 07:48:59 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) 07:48:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/radio_si470x_usb', 0x200, 0x112) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, r1, 0x26}, 0x10) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) 07:48:59 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 3) [ 2313.927310][T26039] RAX: ffffffffffffffda RBX: 00007fb457a72f80 RCX: 00007fb457953ae9 [ 2313.935281][T26039] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 2313.943254][T26039] RBP: 00007fb456cd6120 R08: 0000000000000000 R09: 0000000000000000 [ 2313.951227][T26039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2313.959209][T26039] R13: 000000000000000b R14: 00007fb457a72f80 R15: 00007ffea0f410f8 [ 2313.967186][T26039] 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 07:48:59 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 07:48:59 executing program 3: socketpair(0x1f, 0xa, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x10000000) 07:48:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 4) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x500}}, 0x10) [ 2314.107387][T26089] FAULT_INJECTION: forcing a failure. [ 2314.107387][T26089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2314.120477][T26089] CPU: 0 PID: 26089 Comm: syz-executor.5 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2314.130550][T26089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2314.140607][T26089] Call Trace: [ 2314.143887][T26089] [ 2314.146810][T26089] dump_stack_lvl+0xda/0x130 [ 2314.151462][T26089] dump_stack+0x15/0x20 [ 2314.155686][T26089] should_fail_ex+0x21f/0x230 [ 2314.160367][T26089] should_fail+0xb/0x10 [ 2314.164525][T26089] should_fail_usercopy+0x1a/0x20 [ 2314.169601][T26089] _copy_from_iter+0xd8/0xa90 [ 2314.174287][T26089] ? kmalloc_reserve+0xfb/0x190 [ 2314.179142][T26089] ? __build_skb_around+0x196/0x1f0 [ 2314.184350][T26089] ? __virt_addr_valid+0x16a/0x1b0 [ 2314.189570][T26089] ? __check_object_size+0x364/0x510 [ 2314.194919][T26089] netlink_sendmsg+0x53c/0x770 [ 2314.199843][T26089] ? netlink_getsockopt+0x3e0/0x3e0 [ 2314.205052][T26089] ____sys_sendmsg+0x37c/0x4d0 [ 2314.209899][T26089] __sys_sendmsg+0x1e9/0x270 [ 2314.214526][T26089] __x64_sys_sendmsg+0x46/0x50 [ 2314.219364][T26089] do_syscall_64+0x41/0xc0 [ 2314.223852][T26089] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2314.229745][T26089] RIP: 0033:0x7fb457953ae9 [ 2314.234161][T26089] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2314.253799][T26089] RSP: 002b:00007fb456cd60c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2314.262209][T26089] RAX: ffffffffffffffda RBX: 00007fb457a72f80 RCX: 00007fb457953ae9 [ 2314.270191][T26089] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 2314.278160][T26089] RBP: 00007fb456cd6120 R08: 0000000000000000 R09: 0000000000000000 [ 2314.286145][T26089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2314.294126][T26089] R13: 000000000000000b R14: 00007fb457a72f80 R15: 00007ffea0f410f8 [ 2314.302143][T26089] 07:48:59 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x600}}, 0xfffffdef) 07:48:59 executing program 3: socketpair(0x1f, 0xa, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x10000000) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x600}}, 0x10) 07:48:59 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 07:48:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 5) 07:48:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x22, "a66ecc", "362c5ca30e7c24ff115b8229475282eb9be51ace9d7892b435f4a5cc2330bc2efb4a3c2cb859932378224641b51a260ced1529d7d2403b2e4be42255e81cc80d0f6d10303c8af88e8b13882a4793f11d54b0ee85c4aa2c0c6d4097c8226d372d8990fa1e9e1ffedd7b2bb3efe18532549c32afbbbe00dc6e9fb9ecb1dd7257e938184fc9596cfd933f643e4789bdcff8da5b8ba2882c4771815297f9cae0082caf4718ebf7bd98a7e4583da2ea319dcbf98e19f216cba55c5a60cc3f6c7bec387bb14a6b93aefab828fc8a590bdc52ba822889e64751420671c63bf76a955aa410202e0e28563b8b75201c0c2411ec151184ebce54d470c484981d88868ddb93"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/i2c_i801', 0x301080, 0xc7) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r11}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r11}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x4, {0x7, 0x9, "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", 0x5, 0x5, 0x63, 0x4a, 0x1, 0x4, 0x4, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x6, "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", 0x6, 0x8c, 0x40, 0x7, 0x1, 0x0, 0x0, 0x1}, r3}}, 0x128) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x1000000}}, 0x10) 07:48:59 executing program 3: socketpair(0x1f, 0xa, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x10000000) socketpair(0x1f, 0xa, 0x100, &(0x7f0000000000)) (async) getsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x10000000) (async) [ 2314.406557][T26104] FAULT_INJECTION: forcing a failure. [ 2314.406557][T26104] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.419288][T26104] CPU: 0 PID: 26104 Comm: syz-executor.5 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2314.429360][T26104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2314.439527][T26104] Call Trace: [ 2314.442853][T26104] [ 2314.445784][T26104] dump_stack_lvl+0xda/0x130 [ 2314.450397][T26104] dump_stack+0x15/0x20 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x2000000}}, 0x10) [ 2314.454583][T26104] should_fail_ex+0x21f/0x230 [ 2314.459280][T26104] __should_failslab+0x92/0xa0 [ 2314.464085][T26104] should_failslab+0x9/0x20 [ 2314.468603][T26104] slab_pre_alloc_hook+0x38/0x180 [ 2314.473691][T26104] kmem_cache_alloc+0x52/0x220 [ 2314.478462][T26104] ? skb_clone+0x154/0x1e0 [ 2314.482938][T26104] skb_clone+0x154/0x1e0 [ 2314.487243][T26104] __netlink_deliver_tap+0x2c0/0x4c0 [ 2314.492545][T26104] netlink_unicast+0x61b/0x640 [ 2314.497339][T26104] netlink_sendmsg+0x66e/0x770 [ 2314.502111][T26104] ? netlink_getsockopt+0x3e0/0x3e0 [ 2314.507399][T26104] ____sys_sendmsg+0x37c/0x4d0 [ 2314.512176][T26104] __sys_sendmsg+0x1e9/0x270 [ 2314.516901][T26104] __x64_sys_sendmsg+0x46/0x50 [ 2314.521756][T26104] do_syscall_64+0x41/0xc0 [ 2314.526186][T26104] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2314.532171][T26104] RIP: 0033:0x7fb457953ae9 [ 2314.536581][T26104] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2314.556257][T26104] RSP: 002b:00007fb456cd60c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2314.564713][T26104] RAX: ffffffffffffffda RBX: 00007fb457a72f80 RCX: 00007fb457953ae9 [ 2314.572718][T26104] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 2314.580693][T26104] RBP: 00007fb456cd6120 R08: 0000000000000000 R09: 0000000000000000 [ 2314.588738][T26104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2314.597251][T26104] R13: 000000000000000b R14: 00007fb457a72f80 R15: 00007ffea0f410f8 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x5000000}}, 0x10) 07:48:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 6) 07:48:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x6000000}}, 0x10) [ 2314.605252][T26104] [ 2314.614780][T26104] tipc: Enabled bearer , priority 0 [ 2314.670569][T26122] FAULT_INJECTION: forcing a failure. [ 2314.670569][T26122] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.683280][T26122] CPU: 0 PID: 26122 Comm: syz-executor.5 Not tainted 6.5.0-syzkaller-11812-g7733171926cc #0 [ 2314.693476][T26122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 2314.703538][T26122] Call Trace: [ 2314.706819][T26122] [ 2314.709757][T26122] dump_stack_lvl+0xda/0x130 [ 2314.714364][T26122] dump_stack+0x15/0x20 [ 2314.718643][T26122] should_fail_ex+0x21f/0x230 [ 2314.723355][T26122] __should_failslab+0x92/0xa0 [ 2314.728207][T26122] should_failslab+0x9/0x20 [ 2314.732748][T26122] slab_pre_alloc_hook+0x38/0x180 [ 2314.737783][T26122] kmem_cache_alloc_node+0x54/0x240 [ 2314.743103][T26122] ? __alloc_skb+0x109/0x2e0 [ 2314.747785][T26122] __alloc_skb+0x109/0x2e0 [ 2314.752288][T26122] tipc_nl_compat_doit+0xc8/0x350 [ 2314.757329][T26122] ? security_capable+0x5e/0x80 [ 2314.762203][T26122] tipc_nl_compat_recv+0x760/0x850 [ 2314.767389][T26122] ? tipc_nl_bearer_disable+0x30/0x30 [ 2314.772765][T26122] ? tipc_nl_compat_dumpit+0x3f0/0x3f0 [ 2314.778348][T26122] genl_rcv_msg+0x607/0x6a0 [ 2314.782880][T26122] ? tipc_netlink_compat_stop+0x20/0x20 [ 2314.788443][T26122] netlink_rcv_skb+0x126/0x220 [ 2314.793274][T26122] ? genl_bind+0x1b0/0x1b0 [ 2314.797703][T26122] genl_rcv+0x28/0x40 [ 2314.801690][T26122] netlink_unicast+0x575/0x640 [ 2314.806460][T26122] netlink_sendmsg+0x66e/0x770 [ 2314.811293][T26122] ? netlink_getsockopt+0x3e0/0x3e0 [ 2314.816547][T26122] ____sys_sendmsg+0x37c/0x4d0 07:49:00 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x604}}, 0xfffffdef) 07:49:00 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 07:49:00 executing program 3: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"698178a7330da67861c77f17f080d94a", 0x0, 0x0, {0x8000000000000000, 0x6}, {0x6}, 0xd, [0xfffffffffffffff9, 0x80000000, 0x9, 0xce7, 0x4e7, 0x8, 0x5, 0xd5, 0x401, 0x8000000000000000, 0xc5, 0xe2f, 0x6, 0x8, 0x7, 0x6]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ipip', 0x2, 0x5) bind$802154_dgram(r2, &(0x7f00000002c0)={0x24, @short={0x2, 0xffff, 0xaaa2}}, 0x14) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="e7478e0000c1d56bda583094839cefa283540ef3a80c586f52f441336ba801b270bc92cec439edea7c15d0e3d144c39874e3a00dce523938cbb3475c822b0236e0fe1e16a6e164308204705d272747298fdacfa60e9447bf314218632123e04e61c67f5eaf2b8618614e2ff527754b80000000", @ANYRES16=r1, @ANYBLOB="000425bd7068d900147f63c712b52d56fddbdf25010000000000000080410000002000170000000b000000026574683a76657468315f"], 0x3c}, 0x1, 0x0, 0x0, 0x20008004}, 0x8001) 07:49:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8000000}}, 0x10) [ 2314.821465][T26122] __sys_sendmsg+0x1e9/0x270 [ 2314.826144][T26122] __x64_sys_sendmsg+0x46/0x50 [ 2314.830986][T26122] do_syscall_64+0x41/0xc0 [ 2314.835549][T26122] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2314.841507][T26122] RIP: 0033:0x7fb457953ae9 [ 2314.846075][T26122] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:49:00 executing program 3: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"698178a7330da67861c77f17f080d94a", 0x0, 0x0, {0x8000000000000000, 0x6}, {0x6}, 0xd, [0xfffffffffffffff9, 0x80000000, 0x9, 0xce7, 0x4e7, 0x8, 0x5, 0xd5, 0x401, 0x8000000000000000, 0xc5, 0xe2f, 0x6, 0x8, 0x7, 0x6]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ipip', 0x2, 0x5) bind$802154_dgram(r2, &(0x7f00000002c0)={0x24, @short={0x2, 0xffff, 0xaaa2}}, 0x14) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="e7478e0000c1d56bda583094839cefa283540ef3a80c586f52f441336ba801b270bc92cec439edea7c15d0e3d144c39874e3a00dce523938cbb3475c822b0236e0fe1e16a6e164308204705d272747298fdacfa60e9447bf314218632123e04e61c67f5eaf2b8618614e2ff527754b80000000", @ANYRES16=r1, @ANYBLOB="000425bd7068d900147f63c712b52d56fddbdf25010000000000000080410000002000170000000b000000026574683a76657468315f"], 0x3c}, 0x1, 0x0, 0x0, 0x20008004}, 0x8001) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"698178a7330da67861c77f17f080d94a", 0x0, 0x0, {0x8000000000000000, 0x6}, {0x6}, 0xd, [0xfffffffffffffff9, 0x80000000, 0x9, 0xce7, 0x4e7, 0x8, 0x5, 0xd5, 0x401, 0x8000000000000000, 0xc5, 0xe2f, 0x6, 0x8, 0x7, 0x6]}) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ipip', 0x2, 0x5) (async) bind$802154_dgram(r2, &(0x7f00000002c0)={0x24, @short={0x2, 0xffff, 0xaaa2}}, 0x14) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="e7478e0000c1d56bda583094839cefa283540ef3a80c586f52f441336ba801b270bc92cec439edea7c15d0e3d144c39874e3a00dce523938cbb3475c822b0236e0fe1e16a6e164308204705d272747298fdacfa60e9447bf314218632123e04e61c67f5eaf2b8618614e2ff527754b80000000", @ANYRES16=r1, @ANYBLOB="000425bd7068d900147f63c712b52d56fddbdf25010000000000000080410000002000170000000b000000026574683a76657468315f"], 0x3c}, 0x1, 0x0, 0x0, 0x20008004}, 0x8001) (async) 07:49:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x22, "a66ecc", "362c5ca30e7c24ff115b8229475282eb9be51ace9d7892b435f4a5cc2330bc2efb4a3c2cb859932378224641b51a260ced1529d7d2403b2e4be42255e81cc80d0f6d10303c8af88e8b13882a4793f11d54b0ee85c4aa2c0c6d4097c8226d372d8990fa1e9e1ffedd7b2bb3efe18532549c32afbbbe00dc6e9fb9ecb1dd7257e938184fc9596cfd933f643e4789bdcff8da5b8ba2882c4771815297f9cae0082caf4718ebf7bd98a7e4583da2ea319dcbf98e19f216cba55c5a60cc3f6c7bec387bb14a6b93aefab828fc8a590bdc52ba822889e64751420671c63bf76a955aa410202e0e28563b8b75201c0c2411ec151184ebce54d470c484981d88868ddb93"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/i2c_i801', 0x301080, 0xc7) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r11}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r11}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x4, {0x7, 0x9, "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", 0x5, 0x5, 0x63, 0x4a, 0x1, 0x4, 0x4, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x6, "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", 0x6, 0x8c, 0x40, 0x7, 0x1, 0x0, 0x0, 0x1}, r3}}, 0x128) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x22, "a66ecc", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/i2c_i801', 0x301080, 0xc7) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r11}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r11}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x4, {0x7, 0x9, "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", 0x5, 0x5, 0x63, 0x4a, 0x1, 0x4, 0x4, 0x1}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x6, "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", 0x6, 0x8c, 0x40, 0x7, 0x1, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) 07:49:00 executing program 3: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"698178a7330da67861c77f17f080d94a", 0x0, 0x0, {0x8000000000000000, 0x6}, {0x6}, 0xd, [0xfffffffffffffff9, 0x80000000, 0x9, 0xce7, 0x4e7, 0x8, 0x5, 0xd5, 0x401, 0x8000000000000000, 0xc5, 0xe2f, 0x6, 0x8, 0x7, 0x6]}) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/ipip', 0x2, 0x5) bind$802154_dgram(r2, &(0x7f00000002c0)={0x24, @short={0x2, 0xffff, 0xaaa2}}, 0x14) (async, rerun: 64) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="e7478e0000c1d56bda583094839cefa283540ef3a80c586f52f441336ba801b270bc92cec439edea7c15d0e3d144c39874e3a00dce523938cbb3475c822b0236e0fe1e16a6e164308204705d272747298fdacfa60e9447bf314218632123e04e61c67f5eaf2b8618614e2ff527754b80000000", @ANYRES16=r1, @ANYBLOB="000425bd7068d900147f63c712b52d56fddbdf25010000000000000080410000002000170000000b000000026574683a76657468315f"], 0x3c}, 0x1, 0x0, 0x0, 0x20008004}, 0x8001) (rerun: 64) [ 2314.865686][T26122] RSP: 002b:00007fb456cd60c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2314.874232][T26122] RAX: ffffffffffffffda RBX: 00007fb457a72f80 RCX: 00007fb457953ae9 [ 2314.882209][T26122] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 2314.890205][T26122] RBP: 00007fb456cd6120 R08: 0000000000000000 R09: 0000000000000000 [ 2314.898179][T26122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2314.906154][T26122] R13: 000000000000000b R14: 00007fb457a72f80 R15: 00007ffea0f410f8 [ 2314.914128][T26122] 07:49:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x450501, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:49:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x10000000}}, 0x10) 07:49:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x450501, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:49:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "14aeccdd88da63a0f59c6082858a36b47cceb0ca41eb6c50189de2172b0c358057cc6513c20551a6b92d87b055fcd76d04c41926744d3d8ff2be12b5deccdecc6ff5fc405d9552e4d9a77685a1da8fd06c5c359895aac4f3f207a4c36bc1bde933e2d21bc4a8345ebe1eea66d52d39b9c9f7411083c7de04b297025c69cc53f87dbf22f1c939142d3ec452d6be4ade63c0678abf4b9d749e94986e0aa91ff2fc59248d85d107d3b990a6a79dba2c0d8854a563b8776298f0386cb9a13c12d1ed775ef2f3f35221d25c4542ff58ef5782f18c89f1975cc4db6d295d74b7b7324c2818343c42bcb984e4b765dddd35caa9f405605ef20702d8b83082151e016cc9"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0xdff) 07:49:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x450501, 0x408) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 07:49:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 7) 07:49:00 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x204, 0x18, 0xfa00, {0x0, 0x0, 0x810}}, 0xfffffdef) 07:49:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000000)=""/6, 0x6, 0x0, &(0x7f0000000040)}}, 0x10) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000) 07:49:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ed", "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"}}, 0xfdef) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0xfdef) 07:49:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0xfffffdef) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x22, "a66ecc", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x22, "a66ecc", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/i2c_i801', 0x301080, 0xc7) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/i2c_i801', 0x301080, 0xc7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r10, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r11}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r11}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r11}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x4, {0x7, 0x9, "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", 0x5, 0x5, 0x63, 0x4a, 0x1, 0x4, 0x4, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x2, 0x6, "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", 0x6, 0x8c, 0x40, 0x7, 0x1, 0x0, 0x0, 0x1}, r3}}, 0x128) 07:49:00 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0xffff0001, {"b4f843fd36fe07bbc062c1170691cc92"}, 0x1, 0x8000, 0x4}}}, 0xffffff8b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/class/infiniband_mad', 0x0, 0x0) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000007c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1525ec", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x20e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 07:49:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x34, r1, 0x105, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) (fail_nth: 8) 07:49:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x452101, 0x408) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000000)=""/6, 0x6, 0x0, &(0x7f0000000040)}}, 0x10) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x10000000)