, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000180)={r0, &(0x7f00000003c0), 0x0}, 0x18) 16:30:55 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:55 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:55 executing program 5: add_key(&(0x7f0000000340)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd0e9f5a47009833063800"}}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}], 0x10) 16:30:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:56 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:56 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:56 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:56 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:56 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:56 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) 16:30:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:56 executing program 5: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 16:30:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8), 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:56 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:56 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:56 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:56 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8), 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:56 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000240)="b156d417452c8f6d46edb3b1077f2aba", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) creat(&(0x7f0000000040)='./file0\x00', 0x0) 16:30:57 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8), 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:57 executing program 5: r0 = socket$inet(0x10, 0x2040000000000002, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300008100041f01000000fc0003c91300010000000000500000007321452e506f32", 0x2f}], 0x1}, 0x0) 16:30:57 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:57 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:57 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:57 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:57 executing program 5: r0 = socket(0x1f, 0x5, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="70000000000000000100000000000080"], 0x10}, 0x1) 16:30:57 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 16:30:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:57 executing program 4: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:57 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:57 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:57 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048041, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) 16:30:58 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:58 executing program 4: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r0, 0x800000c004500a, 0x0) read$FUSE(r0, &(0x7f0000000140), 0x1000) 16:30:58 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:58 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:58 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:58 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:58 executing program 4: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r1 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:58 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:58 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:58 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:59 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:59 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000001300)={r1, 0x3, 0x6, @dev}, 0x10) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) 16:30:59 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:59 executing program 4: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:59 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:59 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) [ 924.197608][ T8400] device syz_tun entered promiscuous mode [ 924.227778][ T8400] device lo entered promiscuous mode [ 924.239111][ T8398] device lo left promiscuous mode [ 924.245077][ T8398] device syz_tun left promiscuous mode 16:30:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) [ 924.321937][ T8400] device syz_tun entered promiscuous mode 16:30:59 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:59 executing program 4: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:59 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) [ 924.378871][ T8398] device syz_tun left promiscuous mode 16:30:59 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:30:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:59 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) sendmmsg(0xffffffffffffffff, &(0x7f0000008600), 0x0, 0x0) close(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)=0xc512) connect$inet6(r3, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 16:30:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:30:59 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:30:59 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 4: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x22, 0x0, &(0x7f00000002c0)) 16:31:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:00 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1005, 0x0) read$FUSE(r0, &(0x7f0000000140), 0x1000) 16:31:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:00 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:00 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x0, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:00 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:00 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x0, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:01 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x4}, 0x10) write(r0, &(0x7f00000000c0)="1c0000004a005f0014f9f407000909000a0080000004000000000000", 0x1c) 16:31:01 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:01 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x0, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:01 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:01 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:01 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:01 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:01 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 16:31:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:02 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:02 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:02 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:02 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:02 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:02 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:02 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:02 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:03 executing program 5: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40e"], 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x141042, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) 16:31:03 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:03 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:03 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:03 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:03 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:03 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40), 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpid() mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x1, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x7bffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffff}}}, 0x90) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) r4 = syz_open_dev$dri(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r4) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') arch_prctl$ARCH_SET_GS(0x1001, 0x10001) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x10, 0x10000000003, 0x9) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = dup2(r5, r6) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000340)="24000000fa0307041dfffdd46fa2830020200a0009ed0300001d85680c1ba3a20400ff7e28000000530403000000a0aa1c0009b356da5a80d18b6e064467bee28f803b5ee9fd62662455a4df", 0x4c}], 0x1}, 0x0) write$UHID_GET_REPORT_REPLY(r7, &(0x7f0000000240)={0xa, 0x8, 0x81}, 0xa) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 16:31:03 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:03 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40), 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:03 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:03 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:03 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:04 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40), 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:04 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:04 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:04 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:04 executing program 5: socket$kcm(0x2, 0x0, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 16:31:04 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:04 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:04 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:04 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:04 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:04 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:05 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:05 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:05 executing program 5: 16:31:05 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:05 executing program 2: 16:31:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:05 executing program 2: 16:31:05 executing program 5: 16:31:05 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 16:31:05 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:05 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:05 executing program 2: 16:31:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:05 executing program 5: 16:31:05 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 16:31:05 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:05 executing program 2: 16:31:05 executing program 5: 16:31:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:06 executing program 2: 16:31:06 executing program 5: 16:31:06 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 16:31:06 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[], 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:06 executing program 2: 16:31:06 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:06 executing program 5: 16:31:06 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:06 executing program 2: 16:31:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:06 executing program 5: 16:31:06 executing program 2: 16:31:06 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[], 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:06 executing program 5: 16:31:06 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:06 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:06 executing program 2: 16:31:06 executing program 5: 16:31:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0xff00}, 0x8) 16:31:06 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:06 executing program 2: 16:31:06 executing program 5: 16:31:07 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:07 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[], 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:07 executing program 5: 16:31:07 executing program 2: 16:31:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 16:31:07 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:07 executing program 2: 16:31:07 executing program 5: 16:31:07 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 16:31:07 executing program 5: 16:31:07 executing program 2: 16:31:07 executing program 5: 16:31:07 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:07 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, 0x0, 0x0) 16:31:07 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:07 executing program 2: 16:31:07 executing program 5: 16:31:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0), 0x8) 16:31:07 executing program 2: 16:31:08 executing program 5: 16:31:08 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:08 executing program 2: 16:31:08 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020662a, 0x20000007) 16:31:08 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0), 0x8) 16:31:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0), 0x8) 16:31:08 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) creat(0x0, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r4, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0xc0) close(r4) 16:31:08 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000600)={0x14, 0x0, &(0x7f0000000440)=[@acquire_done={0x40106309, 0x0, 0x2}], 0x0, 0x0, 0x0}) 16:31:08 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:08 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:08 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:08 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000004a005f0014f9f407000909000a0080000300000000000000080002eac3fb51da", 0x24) 16:31:08 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x3b25, &(0x7f0000000740)) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000280)}, 0x68) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000006c0)) syz_emit_ethernet(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x12b}}, {{&(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000a40)=ANY=[], 0x30}}], 0x2, 0x0) futex(&(0x7f0000000100), 0x0, 0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0xc02812f8, &(0x7f0000000140)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfffd, 0x800000, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x10a) 16:31:08 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:08 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:08 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:09 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:09 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:09 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:09 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:09 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:09 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:09 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:09 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:10 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:10 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:10 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:10 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:10 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:11 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:11 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:11 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:11 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:12 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:12 executing program 0: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:12 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:12 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:12 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:12 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:12 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32c"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:12 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:12 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:13 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:13 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:13 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:13 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:13 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32c"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:13 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:13 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:13 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:13 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:14 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32c"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:14 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:14 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:14 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:14 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:14 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 5: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca2"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:15 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:15 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:15 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca2"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:15 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:15 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:15 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:16 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) 16:31:16 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:16 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca2"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:16 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:16 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) 16:31:16 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) 16:31:16 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:16 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:17 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) 16:31:17 executing program 5: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:17 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) 16:31:17 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:17 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:17 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:17 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e569"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r2}}, 0x120) 16:31:17 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:18 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:18 executing program 5: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:18 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:18 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:18 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:18 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:18 executing program 5: r0 = socket(0x0, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:18 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f4"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:18 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:18 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3ddf657ac5aa6f0224e1a721d2e3f95fa2ede"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:19 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:19 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3ddf657ac5aa6f0224e1a721d2e3f95fa2ede"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3ddf657ac5aa6f0224e1a721d2e3f95fa2ede"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:19 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:19 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:20 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:20 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:20 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:20 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:20 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:20 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:20 executing program 1: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x0, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 16:31:20 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:21 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:21 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:21 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:21 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) [ 946.202506][ T9750] debugfs: Directory 'loop0' with parent 'block' already present! 16:31:21 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:21 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:21 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3ddf657ac5aa6f0224e1a721d2e3f95fa2ede"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:21 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:21 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:21 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:21 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:22 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) 16:31:22 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:22 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:22 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:22 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) [ 947.379195][ T8726] debugfs: Directory 'loop0' with parent 'block' already present! 16:31:22 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:22 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:23 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:23 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:23 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:23 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:23 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:23 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:23 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:23 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0x0, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:23 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3ddf657ac5aa6f0224e1a721d2e3f95fa2ede"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:23 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:23 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:24 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:24 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0x0, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:24 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:24 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0x0, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:24 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:25 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:25 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 16:31:25 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:25 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x0, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:25 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:25 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:26 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:26 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:26 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:26 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x0, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:26 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:26 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 16:31:26 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:26 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:27 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x0, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:27 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:27 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:27 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:27 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x0, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:28 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 16:31:28 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x0, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3dd"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:28 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3dd"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:28 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32c"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x0, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3dd"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:29 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) 16:31:29 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32c"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x0, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3dd"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:29 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:29 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:29 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x0, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:29 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:29 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:30 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 16:31:30 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:30 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x0, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 5: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) [ 955.564875][T10197] debugfs: Directory 'loop0' with parent 'block' already present! 16:31:30 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:30 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:30 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:31 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 16:31:31 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:31 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:31 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:31 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) 16:31:31 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:31 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:31 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) 16:31:31 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:31 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:31 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:31 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 16:31:32 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) 16:31:32 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 16:31:32 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:32 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) 16:31:33 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:33 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3dd"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) 16:31:33 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:33 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:33 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) [ 958.919140][T10407] debugfs: Directory 'loop0' with parent 'block' already present! 16:31:34 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:34 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:34 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:34 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:34 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:34 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:34 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800000, 0x6}) 16:31:34 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) creat(0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r4}}, 0x120) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 16:31:34 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) 16:31:34 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde91"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x0, 0xffffffffffffffff, "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", 0x0, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, 0x0, 0x0) 16:31:34 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000580)) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "9b3612e0837b26f61b6d2f4ac4f1fdf7f9f17b82db494e2930850bec94dca2f69f4ac3c7413f3331193577d6c14a4e88f416ca514f3b8254ce8d600296db9c53d5d0018c4136774ffcd82b6dcb6e5b0c9803eaf54caade327a1b6779f14ec836fad55a94b06cc10a811dee66602e39e6cb594e187e1cf32f57c1e63cd5d15c41f9e9e3ae3e4c84968684e272e88a0584353784221538e6fb13fd906cc9f57ecc34b0a171febc365c7e5781812ba92e14be33274844e131da9dcdd8976802efbcdd4c9b472903cf17ba86b7af0ee4dde443e9ca56dae9c886da1d99763cbf62b422edeadc6d9530b57e2ab7b61629e72d4d854c0b0a8090717662c0130ca8d6fb", 0x95, 0x0, 0x7, 0x0, 0x100, 0x40, 0x0, 0x1}, r3}}, 0x120) 16:31:34 executing program 4: r0 = socket(0x80000000000000a, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000fb8571a58e3f2bc28071843e4d730b2509735048d195c04cf91797a054183105c829fdc54bde2f9bfdafea8768bf48b7dc040617bb3d1f814c0d758e9b32f08cd1209135e52b9509f64c9470b5a52b43ae0beaf4d5da5919b15d6f1476a7578a9a8e7982c5dbb95df4c38c342855d3e811ca844150be5ac58ab439314ceeda8caa787228b037ddde9108b6bea191c4e8740018a378d9092aad333a8e7df56fba5e27e66837e5692a04e152df3b1cec17688a22c6eb668c3bde82ccf458adcc36b5fa172bc8065565ebbaa8ebdf54a7b9970a165c21f8a93766dd6d42499aa7b3fc6d8dbeacd2c0bb8a3b66797c2adcf8a32ca276060b0ffb321451f40ed515e210a9e3dd"], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000300), 0x4) creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000f40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000fc0)={0x6, 0x118, 0xfa00, {{0x7, 0xffffffffffffffff, "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", 0x95, 0xfffffffffffffaf1, 0x7, 0x3ff, 0x0, 0x40, 0xffffffffffff312e, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r3, 0x0, 0x0, @ib={0x1b, 0x0, 0x7f, {"bade4d08012686edd46ed6bdf53ca510"}, 0x10001, 0x7, 0x6}}}, 0xa0) [ 959.702154][T31029] ================================================================== [ 959.710498][T31029] BUG: KASAN: use-after-free in debugfs_remove+0x10d/0x130 [ 959.717693][T31029] Read of size 8 at addr ffff888093935900 by task kworker/0:1/31029 [ 959.717709][T31029] [ 959.717724][T31029] CPU: 0 PID: 31029 Comm: kworker/0:1 Not tainted 5.4.0-rc3+ #0 [ 959.717732][T31029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.717749][T31029] Workqueue: events __blk_release_queue [ 959.717757][T31029] Call Trace: [ 959.717912][T31029] dump_stack+0x172/0x1f0 [ 959.717933][T31029] ? debugfs_remove+0x10d/0x130 [ 959.717951][T31029] print_address_description.constprop.0.cold+0xd4/0x30b [ 959.770999][T31029] ? debugfs_remove+0x10d/0x130 [ 959.775859][T31029] ? debugfs_remove+0x10d/0x130 [ 959.780717][T31029] __kasan_report.cold+0x1b/0x41 [ 959.785674][T31029] ? __sanitizer_cov_trace_cmp2+0x10/0x20 [ 959.791404][T31029] ? debugfs_remove+0x10d/0x130 [ 959.796263][T31029] kasan_report+0x12/0x20 [ 959.800600][T31029] __asan_report_load8_noabort+0x14/0x20 [ 959.806240][T31029] debugfs_remove+0x10d/0x130 [ 959.810933][T31029] blk_trace_free+0x38/0x140 [ 959.815546][T31029] __blk_trace_remove+0x78/0xa0 [ 959.820399][T31029] blk_trace_shutdown+0x67/0x90 [ 959.825341][T31029] __blk_release_queue+0x219/0x380 [ 959.830451][T31029] process_one_work+0x9af/0x1740 [ 959.835380][T31029] ? pwq_dec_nr_in_flight+0x320/0x320 [ 959.840735][T31029] ? lock_acquire+0x190/0x410 [ 959.845404][T31029] worker_thread+0x98/0xe40 [ 959.849892][T31029] ? trace_hardirqs_on+0x67/0x240 [ 959.854924][T31029] kthread+0x361/0x430 [ 959.858999][T31029] ? process_one_work+0x1740/0x1740 [ 959.864192][T31029] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 959.870528][T31029] ret_from_fork+0x24/0x30 [ 959.874955][T31029] [ 959.877284][T31029] Allocated by task 10422: [ 959.881723][T31029] save_stack+0x23/0x90 [ 959.885881][T31029] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 959.891536][T31029] kasan_slab_alloc+0xf/0x20 [ 959.896105][T31029] kmem_cache_alloc+0x121/0x710 [ 959.900956][T31029] __d_alloc+0x2e/0x8c0 [ 959.905106][T31029] d_alloc+0x4d/0x280 [ 959.909068][T31029] d_alloc_parallel+0xf4/0x1c30 [ 959.913901][T31029] __lookup_slow+0x1ab/0x500 [ 959.918481][T31029] lookup_one_len+0x16d/0x1a0 [ 959.923146][T31029] start_creating+0xc5/0x1d0 [ 959.927719][T31029] __debugfs_create_file+0x65/0x3f0 [ 959.932900][T31029] debugfs_create_file+0x5a/0x70 [ 959.937958][T31029] do_blk_trace_setup+0x361/0xb50 [ 959.942980][T31029] __blk_trace_setup+0xe3/0x190 [ 959.947821][T31029] blk_trace_ioctl+0x170/0x300 [ 959.952578][T31029] blkdev_ioctl+0x126/0x1c20 [ 959.957159][T31029] block_ioctl+0xee/0x130 [ 959.961484][T31029] do_vfs_ioctl+0xdb6/0x13e0 [ 959.966066][T31029] ksys_ioctl+0xab/0xd0 [ 959.970212][T31029] __x64_sys_ioctl+0x73/0xb0 [ 959.974796][T31029] do_syscall_64+0xfa/0x760 [ 959.979303][T31029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.985179][T31029] [ 959.987489][T31029] Freed by task 10422: [ 959.991546][T31029] save_stack+0x23/0x90 [ 959.995683][T31029] __kasan_slab_free+0x102/0x150 [ 960.000602][T31029] kasan_slab_free+0xe/0x10 [ 960.005086][T31029] kmem_cache_free+0x86/0x320 [ 960.009744][T31029] __d_free+0x20/0x30 [ 960.013704][T31029] rcu_core+0x581/0x1560 [ 960.017933][T31029] rcu_core_si+0x9/0x10 [ 960.022146][T31029] __do_softirq+0x262/0x98c [ 960.026632][T31029] [ 960.028946][T31029] The buggy address belongs to the object at ffff8880939358c0 [ 960.028946][T31029] which belongs to the cache dentry(49:syz2) of size 288 [ 960.043448][T31029] The buggy address is located 64 bytes inside of [ 960.043448][T31029] 288-byte region [ffff8880939358c0, ffff8880939359e0) [ 960.056620][T31029] The buggy address belongs to the page: [ 960.062238][T31029] page:ffffea00024e4d40 refcount:1 mapcount:0 mapping:ffff8880963ee540 index:0xffff888093935080 [ 960.072647][T31029] flags: 0x1fffc0000000200(slab) [ 960.077593][T31029] raw: 01fffc0000000200 ffffea00024e1d48 ffffea00011079c8 ffff8880963ee540 [ 960.086178][T31029] raw: ffff888093935080 ffff888093935080 0000000100000008 0000000000000000 [ 960.094757][T31029] page dumped because: kasan: bad access detected [ 960.101160][T31029] [ 960.103468][T31029] Memory state around the buggy address: [ 960.109076][T31029] ffff888093935800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 960.117127][T31029] ffff888093935880: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 960.125194][T31029] >ffff888093935900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 960.133241][T31029] ^ [ 960.137302][T31029] ffff888093935980: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 960.145359][T31029] ffff888093935a00: fc fc fc fc 00 00 00 00 00 00 00 00 00 00 00 00 [ 960.153408][T31029] ================================================================== [ 960.161460][T31029] Disabling lock debugging due to kernel taint [ 960.176962][T31029] Kernel panic - not syncing: panic_on_warn set ... [ 960.183745][T31029] CPU: 0 PID: 31029 Comm: kworker/0:1 Tainted: G B 5.4.0-rc3+ #0 [ 960.192742][T31029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.202802][T31029] Workqueue: events __blk_release_queue [ 960.208345][T31029] Call Trace: [ 960.211721][T31029] dump_stack+0x172/0x1f0 [ 960.216040][T31029] panic+0x2e3/0x75c [ 960.220043][T31029] ? add_taint.cold+0x16/0x16 [ 960.224725][T31029] ? debugfs_remove+0x10d/0x130 [ 960.229652][T31029] ? preempt_schedule+0x4b/0x60 [ 960.234501][T31029] ? ___preempt_schedule+0x16/0x20 [ 960.239601][T31029] ? trace_hardirqs_on+0x5e/0x240 [ 960.244620][T31029] ? debugfs_remove+0x10d/0x130 [ 960.249523][T31029] end_report+0x47/0x4f [ 960.253676][T31029] ? debugfs_remove+0x10d/0x130 [ 960.258514][T31029] __kasan_report.cold+0xe/0x41 [ 960.263350][T31029] ? __sanitizer_cov_trace_cmp2+0x10/0x20 [ 960.269058][T31029] ? debugfs_remove+0x10d/0x130 [ 960.273905][T31029] kasan_report+0x12/0x20 [ 960.278339][T31029] __asan_report_load8_noabort+0x14/0x20 [ 960.283990][T31029] debugfs_remove+0x10d/0x130 [ 960.288651][T31029] blk_trace_free+0x38/0x140 [ 960.293224][T31029] __blk_trace_remove+0x78/0xa0 [ 960.298215][T31029] blk_trace_shutdown+0x67/0x90 [ 960.303059][T31029] __blk_release_queue+0x219/0x380 [ 960.308161][T31029] process_one_work+0x9af/0x1740 [ 960.313085][T31029] ? pwq_dec_nr_in_flight+0x320/0x320 [ 960.318573][T31029] ? lock_acquire+0x190/0x410 [ 960.323251][T31029] worker_thread+0x98/0xe40 [ 960.327761][T31029] ? trace_hardirqs_on+0x67/0x240 [ 960.332780][T31029] kthread+0x361/0x430 [ 960.336848][T31029] ? process_one_work+0x1740/0x1740 [ 960.342040][T31029] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 960.348273][T31029] ret_from_fork+0x24/0x30 [ 960.354191][T31029] Kernel Offset: disabled [ 960.358532][T31029] Rebooting in 86400 seconds..