, 0x8000, 0xffff, 0x6], [0x8, 0x100, 0xfff, 0x7ff, 0x1d, 0x6ed7, 0x48, 0x34ef, 0x5, 0x100, 0x5, 0x8, 0x9d2, 0x0, 0x8, 0x0, 0x3, 0x5, 0x3ff, 0x10, 0x8, 0x9, 0x1, 0xfffffff8, 0x1, 0x1, 0x4e7c0f29, 0xffff, 0x3, 0x4, 0x9, 0x6, 0x1f, 0x9, 0x6927e63b, 0x9, 0x3, 0x200, 0x80, 0x843, 0x7fff, 0x3, 0xffffffff, 0xba, 0x5, 0x80000000, 0x5, 0x4, 0x81, 0x3f, 0x5, 0x9, 0x10000, 0x3b, 0x7, 0x8001, 0x8, 0x8, 0x5, 0x65f, 0xfff, 0x7f, 0x8, 0x80000001], [0x7f, 0x1, 0x8, 0x10000, 0xd35b, 0xf8, 0x2, 0x4d, 0x6, 0x902, 0x7f, 0xc9, 0x2, 0x200, 0x80000001, 0xf1, 0x6, 0x2, 0x63, 0x4, 0x0, 0x7f000000, 0xa, 0x7fffffff, 0x25dedc68, 0x5, 0x1f, 0x91, 0x200, 0x3ff, 0x1, 0x0, 0x3, 0x8a2, 0x3ff, 0x20, 0x0, 0x3f, 0x3, 0x2, 0xcbbc, 0x1f, 0x2, 0x0, 0x9, 0x80000000, 0x2, 0x6d3f, 0x0, 0x1, 0x4, 0x2, 0x94, 0x11b, 0x9, 0xfffffff9, 0x8, 0x4db3e35, 0x3, 0x1, 0xad, 0x5986, 0x7fff, 0x4], 0x2b, ['\x00', '/dev/vcsu#\x00', ',\x14\x00', '/dev/vcsu#\x00', '%\xa7+/!,\x00', '*\x00', '}\xc8\x00', '}+-\x00', '\x00']}, ["", "", "", "", "", "", ""]}, 0x44c}, 0x1, 0x0, 0x0, 0x400d0}, 0x0) (async) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x44c, 0x3f4, 0x8, 0x70bd27, 0x25dfdbfd, {0x5, 0x1, 0x3f, [0x8, 0x1, 0x1000, 0x7691, 0x8, 0x3ff, 0xf4c, 0x1, 0x5, 0x8001, 0x1, 0x6, 0xfffff03f, 0x8, 0x4, 0x4, 0x8, 0xe48, 0x401, 0xff, 0x101, 0xd842, 0x3f, 0x5, 0x7, 0x81, 0x7fffffff, 0xe5bb, 0x80, 0x6, 0x80000000, 0x8, 0xfffffff7, 0x77, 0x7, 0x9, 0x7, 0x5, 0x101, 0x6, 0x10001, 0x3, 0x1, 0x5, 0xa788, 0xef, 0x1, 0xe4ee, 0x5, 0x0, 0x6, 0x7, 0x3ff, 0x4, 0x5, 0xe5, 0x8, 0x0, 0xaf, 0x0, 0x7f, 0x4, 0x80000000, 0x7f], [0x7, 0x8, 0x80000000, 0x2, 0x1, 0xfffff800, 0x1, 0x5, 0x80, 0x278, 0x1c, 0x6, 0x7f, 0x6, 0x5, 0x48, 0xfffffffa, 0x48e773dc, 0x6bf5, 0x9, 0x0, 0x101, 0x4, 0x5, 0xf63, 0x3e, 0x1ff, 0x8, 0x8, 0x8000, 0x2, 0x4, 0x5, 0x10000, 0x20, 0x522, 0x4, 0xa12, 0x9, 0x3, 0x8, 0xf4c6, 0x3d, 0x2, 0xffff, 0x5, 0xffffffff, 0x3, 0x9, 0x8252, 0x1000, 0x5ec2, 0x6, 0x5, 0x5, 0x0, 0x8, 0x1, 0x3, 0x8, 0x10000, 0x8000, 0xffff, 0x6], [0x8, 0x100, 0xfff, 0x7ff, 0x1d, 0x6ed7, 0x48, 0x34ef, 0x5, 0x100, 0x5, 0x8, 0x9d2, 0x0, 0x8, 0x0, 0x3, 0x5, 0x3ff, 0x10, 0x8, 0x9, 0x1, 0xfffffff8, 0x1, 0x1, 0x4e7c0f29, 0xffff, 0x3, 0x4, 0x9, 0x6, 0x1f, 0x9, 0x6927e63b, 0x9, 0x3, 0x200, 0x80, 0x843, 0x7fff, 0x3, 0xffffffff, 0xba, 0x5, 0x80000000, 0x5, 0x4, 0x81, 0x3f, 0x5, 0x9, 0x10000, 0x3b, 0x7, 0x8001, 0x8, 0x8, 0x5, 0x65f, 0xfff, 0x7f, 0x8, 0x80000001], [0x7f, 0x1, 0x8, 0x10000, 0xd35b, 0xf8, 0x2, 0x4d, 0x6, 0x902, 0x7f, 0xc9, 0x2, 0x200, 0x80000001, 0xf1, 0x6, 0x2, 0x63, 0x4, 0x0, 0x7f000000, 0xa, 0x7fffffff, 0x25dedc68, 0x5, 0x1f, 0x91, 0x200, 0x3ff, 0x1, 0x0, 0x3, 0x8a2, 0x3ff, 0x20, 0x0, 0x3f, 0x3, 0x2, 0xcbbc, 0x1f, 0x2, 0x0, 0x9, 0x80000000, 0x2, 0x6d3f, 0x0, 0x1, 0x4, 0x2, 0x94, 0x11b, 0x9, 0xfffffff9, 0x8, 0x4db3e35, 0x3, 0x1, 0xad, 0x5986, 0x7fff, 0x4], 0x2b, ['\x00', '/dev/vcsu#\x00', ',\x14\x00', '/dev/vcsu#\x00', '%\xa7+/!,\x00', '*\x00', '}\xc8\x00', '}+-\x00', '\x00']}, ["", "", "", "", "", "", ""]}, 0x44c}, 0x1, 0x0, 0x0, 0x400d0}, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r1) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r3) (async) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r3) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x40, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_LEVEL={0x1c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004085}, 0x8000) 01:24:17 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(0xffffffffffffffff, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 1: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0x7}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x8c000) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000040)=[0x5, 0x80000001, 0x2980, 0x9, 0x6, 0x6, 0x0, 0x8]) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(0xffffffffffffffff, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0xeb6e, 0x2d8c, "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", 0x8, 0x1, 0x4, 0x7, 0x0, 0x9, 0x6, 0x1}}}, 0x128) 01:24:17 executing program 1: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) (async) syz_io_uring_complete(0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) (async) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) (async) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) (async) syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) (async) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) (async) 01:24:17 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) [ 1513.668637][ T26] audit: type=1400 audit(1693272257.027:586): avc: denied { view } for pid=11973 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x8c000) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000040)=[0x5, 0x80000001, 0x2980, 0x9, 0x6, 0x6, 0x0, 0x8]) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x64, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fffffffffffffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0xc000}, 0x6ac168b959fdab00) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0xeb6e, 0x2d8c, "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", 0x8, 0x1, 0x4, 0x7, 0x0, 0x9, 0x6, 0x1}}}, 0x128) 01:24:17 executing program 1: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) (async) syz_io_uring_complete(0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) (async) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) (async) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) (async) syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) (async) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) (async) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x8c000) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000040)=[0x5, 0x80000001, 0x2980, 0x9, 0x6, 0x6, 0x0, 0x8]) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x64, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fffffffffffffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0xc000}, 0x6ac168b959fdab00) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0xeb6e, 0x2d8c, "2bf215280dc75ced7e30ba564a7580d18cc8113256cd99d97c39283a85dc3b47ac59fee13a7dea3e0841fd688c5d54900831c05296846b7a293751abbbe72b2fbea2da9f00a4655049e0bdf833240e57b08ea4795480e3e6aee27a8c6355982903110d2a745aa8f5b5b1892492ee464594ea162737f449b89ce703ca26030d60917b7c367bb6446241a8d66fc3c7ef391b61fa0e60cc6e1b0af7ff0b2ec631923d02ac1f54b2a0e308934b75084b885602c555a744c18a39167c9ca14b6ff9705b22df8eb744ce7369aee1cc48ad3a7b1d67a7a332939a90781d1dce5609127f2641a8799786e770a9a11c532e22f82ee3f286d56930889c26ade05edf6e3b2e", 0x8, 0x1, 0x4, 0x7, 0x0, 0x9, 0x6, 0x1}}}, 0x128) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0xeb6e, 0x2d8c, "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", 0x8, 0x1, 0x4, 0x7, 0x0, 0x9, 0x6, 0x1}}}, 0x128) (async) 01:24:17 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) 01:24:17 executing program 0: syz_io_uring_setup(0x4cef, &(0x7f0000000000)={0x0, 0x7c55, 0x8, 0x2, 0xd0}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_SHUTDOWN={0x22, 0x42, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x64, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xf7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x21}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fffffffffffffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0xc000}, 0x6ac168b959fdab00) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r2, 0x1}}, 0x18) 01:24:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xb3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24048000}, 0x881) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x2, 0x80002) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x8, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r4) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x60, r6, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, 'macvlan1\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r7}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0xd, 0x14, 'nl802154\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040004}, 0x0) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, '\x00', 0x34}, 0x1}, r3}}, 0x38) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000280)=""/218, 0xda) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 0: syz_io_uring_setup(0x4cef, &(0x7f0000000000)={0x0, 0x7c55, 0x8, 0x2, 0xd0}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_SHUTDOWN={0x22, 0x42, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_io_uring_setup(0x4cef, &(0x7f0000000000)={0x0, 0x7c55, 0x8, 0x2, 0xd0}, &(0x7f00000000c0), &(0x7f0000000100)) (async) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_SHUTDOWN={0x22, 0x42, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 3: write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x1}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x1}}, 0x18) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000080)=""/135) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/114) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, '\x00', 0x34}, 0x1}, r3}}, 0x38) 01:24:17 executing program 3: write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x1}}, 0x18) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x1}}, 0x18) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000080)=""/135) (async) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/114) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) (rerun: 32) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) (rerun: 64) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) (async) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000280)=""/218, 0xda) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 0: syz_io_uring_setup(0x4cef, &(0x7f0000000000)={0x0, 0x7c55, 0x8, 0x2, 0xd0}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_SHUTDOWN={0x22, 0x42, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_io_uring_setup(0x4cef, &(0x7f0000000000)={0x0, 0x7c55, 0x8, 0x2, 0xd0}, &(0x7f00000000c0), &(0x7f0000000100)) (async) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_SHUTDOWN={0x22, 0x42, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xb3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24048000}, 0x881) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x2, 0x80002) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x8, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r4) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x60, r6, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, 'macvlan1\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r7}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0xd, 0x14, 'nl802154\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040004}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) (async) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xb3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24048000}, 0x881) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x2, 0x80002) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x8, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) (async) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r4) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x60, r6, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, 'macvlan1\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r7}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0xd, 0x14, 'nl802154\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040004}, 0x0) (async) 01:24:17 executing program 3: write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x1}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x1}}, 0x18) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000080)=""/135) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/114) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000600), 0xffffffffffffffff, 0x1}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x1}}, 0x18) (async) shmctl$IPC_RMID(0x0, 0x0) (async) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000080)=""/135) (async) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/114) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, 0x0, 0x0) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, '\x00', 0x34}, 0x1}, r3}}, 0x38) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) getsockname$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) socketpair(0x18, 0x800, 0xc512, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3e}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8}, {0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8840}, 0x8000) 01:24:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, r1, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:udev_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:userio_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netdevsim0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x32, 0x7, 'system_u:object_r:systemd_systemctl_exec_t:s0\x00'}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x20004001) r2 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x6}}, 0x18) socket$inet6(0xa, 0xa, 0x0) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x148, 0x60be, 0x3, 0x1, 0x5, 0x2, 0xffffff85]) 01:24:17 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x3) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, 0x0, 0x0) 01:24:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xb3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24048000}, 0x881) (async) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xb3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}]}, @NL802154_ATTR_SEC_LEVEL={0x14, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x7c}, 0x1, 0x0, 0x0, 0x24048000}, 0x881) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x2, 0x80002) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x8, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r4) (async) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r4) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x60, r6, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, 'macvlan1\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r3}, {0x8, 0x1, r7}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7ff}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0xd, 0x14, 'nl802154\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040004}, 0x0) 01:24:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) (async) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) (async) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000280)=""/218, 0xda) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/233, 0xe9) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, 0x0, 0x0) 01:24:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x20800) 01:24:17 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r2) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x3) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) getsockname$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) (rerun: 32) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) (async) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) socketpair(0x18, 0x800, 0xc512, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3e}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8}, {0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8840}, 0x8000) 01:24:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000280)=""/218, 0xda) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x3) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x20800) 01:24:17 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, r1, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:udev_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:userio_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netdevsim0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x32, 0x7, 'system_u:object_r:systemd_systemctl_exec_t:s0\x00'}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x20004001) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r2 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x6}}, 0x18) socket$inet6(0xa, 0xa, 0x0) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x148, 0x60be, 0x3, 0x1, 0x5, 0x2, 0xffffff85]) 01:24:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000280)=""/218, 0xda) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937ad6eed25c74eef231dada1fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a237ed4834491cd5ea388e583077400"}}, 0x110) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xa93e, @local, 0x5d4}}}, 0x90) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) getsockname$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) socketpair(0x18, 0x800, 0xc512, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3e}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8}, {0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8840}, 0x8000) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) getsockname$l2tp6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x18}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) socketpair(0x18, 0x800, 0xc512, &(0x7f00000001c0)) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3e}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x7c, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8}, {0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3f}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8840}, 0x8000) (async) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x4d47, &(0x7f0000000080)={0x0, 0x89e5, 0x200, 0x8001, 0x6d}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x4daf56db, &(0x7f00000002c0)={0x0, 0xc944, 0x400, 0x0, 0x2a}, &(0x7f0000000180), &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_SHUTDOWN={0x22, 0x62, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e24, 0x0, @private1}, r3}}, 0x48) r4 = socket(0x9, 0x6, 0x215) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000500)={0x0, 0x2a1, "64e698", 0x6, 0x3}) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_setup(0x10a9, &(0x7f00000003c0)={0x0, 0xecc4, 0x400, 0x2, 0xff, 0x0, r5}, &(0x7f0000000440), &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r3}}, 0x30) 01:24:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x20800) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x20800) (async) 01:24:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000280)=""/218, 0xda) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x4d47, &(0x7f0000000080)={0x0, 0x89e5, 0x200, 0x8001, 0x6d}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x4daf56db, &(0x7f00000002c0)={0x0, 0xc944, 0x400, 0x0, 0x2a}, &(0x7f0000000180), &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_SHUTDOWN={0x22, 0x62, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) (async) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_SHUTDOWN={0x22, 0x62, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e24, 0x0, @private1}, r3}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e24, 0x0, @private1}, r3}}, 0x48) r4 = socket(0x9, 0x6, 0x215) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000500)={0x0, 0x2a1, "64e698", 0x6, 0x3}) (async) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000500)={0x0, 0x2a1, "64e698", 0x6, 0x3}) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_setup(0x10a9, &(0x7f00000003c0)={0x0, 0xecc4, 0x400, 0x2, 0xff, 0x0, r5}, &(0x7f0000000440), &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r3}}, 0x30) 01:24:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/204, 0xcc) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e22, @local}, 0x10) 01:24:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_io_uring_complete(0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937ad6eed25c74eef231dada1fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a237ed4834491cd5ea388e583077400"}}, 0x110) (async) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) (async, rerun: 64) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xa93e, @local, 0x5d4}}}, 0x90) 01:24:17 executing program 0: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) (async) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, r1, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:udev_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:userio_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netdevsim0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x32, 0x7, 'system_u:object_r:systemd_systemctl_exec_t:s0\x00'}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x20004001) (async) r2 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x6}}, 0x18) (async, rerun: 64) socket$inet6(0xa, 0xa, 0x0) (async, rerun: 64) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, &(0x7f0000000000)=[0x148, 0x60be, 0x3, 0x1, 0x5, 0x2, 0xffffff85]) 01:24:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/204, 0xcc) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e22, @local}, 0x10) 01:24:17 executing program 0: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) syz_io_uring_setup(0x4d47, &(0x7f0000000080)={0x0, 0x89e5, 0x200, 0x8001, 0x6d}, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_setup(0x4daf56db, &(0x7f00000002c0)={0x0, 0xc944, 0x400, 0x0, 0x2a}, &(0x7f0000000180), &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_SHUTDOWN={0x22, 0x62, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e24, 0x0, @private1}, r3}}, 0x48) r4 = socket(0x9, 0x6, 0x215) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000500)={0x0, 0x2a1, "64e698", 0x6, 0x3}) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_io_uring_setup(0x10a9, &(0x7f00000003c0)={0x0, 0xecc4, 0x400, 0x2, 0xff, 0x0, r5}, &(0x7f0000000440), &(0x7f0000000480)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r3}}, 0x30) 01:24:17 executing program 0: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_io_uring_complete(0x0) (async) r1 = syz_io_uring_complete(0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937ad6eed25c74eef231dada1fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a237ed4834491cd5ea388e583077400"}}, 0x110) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xa93e, @local, 0x5d4}}}, 0x90) 01:24:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/204, 0xcc) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e22, @local}, 0x10) 01:24:17 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x800, 0x70bd2d, 0x25dfdbfb, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x20040001) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x3, "cc338a", "440192cb9579e8aeece623ae177fe55fe42a4de40a7c248232b3673c2bfe7835e66a4afc4a7954b3fce0398e0e23ccdc495c1e8790d3a688539afc8ab95ef08d52af5ed7f8bb2470846ee72424d3f75566a02fcfb7a1d292c0c9878ad405bc1f3f3c6ec2d38c05f7b631a6c253eb1b9e33c19351c1a892c295a4d1b0d112bd46b1a4e76686f91f1aff2f86d5689af17ad32532962d937a25d48eb2c275ffdca12fb503c05f763346f3abecbfaafff09a8793e001112aa4cad983db097111e46bc75b83a95d692b9fbf811ba83e9e9c1aeaad254c95c7e94cddccc325cb4612eded8bfdae13df90897fcb2b8ef7bc417325c7bf3220d1b831b2d88b69d06678db"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000080)=""/211, 0xd3) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r8, &(0x7f0000000180)=""/201, 0xfdef) 01:24:17 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x800, 0x70bd2d, 0x25dfdbfb, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x20040001) 01:24:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x3, "cc338a", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x3, "cc338a", "440192cb9579e8aeece623ae177fe55fe42a4de40a7c248232b3673c2bfe7835e66a4afc4a7954b3fce0398e0e23ccdc495c1e8790d3a688539afc8ab95ef08d52af5ed7f8bb2470846ee72424d3f75566a02fcfb7a1d292c0c9878ad405bc1f3f3c6ec2d38c05f7b631a6c253eb1b9e33c19351c1a892c295a4d1b0d112bd46b1a4e76686f91f1aff2f86d5689af17ad32532962d937a25d48eb2c275ffdca12fb503c05f763346f3abecbfaafff09a8793e001112aa4cad983db097111e46bc75b83a95d692b9fbf811ba83e9e9c1aeaad254c95c7e94cddccc325cb4612eded8bfdae13df90897fcb2b8ef7bc417325c7bf3220d1b831b2d88b69d06678db"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:17 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:17 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) (async, rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 64) 01:24:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) read$msr(0xffffffffffffffff, &(0x7f0000000080)=""/211, 0xd3) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async, rerun: 64) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000000)) (rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x3, "cc338a", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) read$msr(0xffffffffffffffff, &(0x7f0000000280)=""/218, 0xda) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x800, 0x70bd2d, 0x25dfdbfb, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x20040001) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) read$msr(0xffffffffffffffff, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) read$msr(0xffffffffffffffff, &(0x7f0000000280)=""/218, 0xda) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 0: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0xa0) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) select(0x40, &(0x7f0000000000)={0xffffffffffffff14, 0x2, 0x9, 0x8, 0x3, 0xfef, 0x36, 0x7fffffff}, &(0x7f0000000280)={0x4, 0x7fffffffffffffff, 0xe31d, 0x2, 0x20, 0x76, 0x7fff, 0x2}, &(0x7f00000002c0)={0xce00000000000000, 0x6, 0x7fff, 0x8001, 0xe67, 0x5, 0x7f, 0x1}, &(0x7f0000000300)={0x0, 0xea60}) 01:24:18 executing program 2: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x30) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async, rerun: 64) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async, rerun: 64) select(0x40, &(0x7f0000000000)={0xffffffffffffff14, 0x2, 0x9, 0x8, 0x3, 0xfef, 0x36, 0x7fffffff}, &(0x7f0000000280)={0x4, 0x7fffffffffffffff, 0xe31d, 0x2, 0x20, 0x76, 0x7fff, 0x2}, &(0x7f00000002c0)={0xce00000000000000, 0x6, 0x7fff, 0x8001, 0xe67, 0x5, 0x7f, 0x1}, &(0x7f0000000300)={0x0, 0xea60}) 01:24:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fcdbdf252e0000000a000aba93fae6e8edb0cf524c2ab117", @ANYRES32=r6, @ANYBLOB="08002c0004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8060}, 0x400c005) read$msr(0xffffffffffffffff, &(0x7f0000000280)=""/218, 0xda) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) (async) 01:24:18 executing program 0: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0xa0) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0xa0) (async) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x30) (async) 01:24:18 executing program 2: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r3) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r7, &(0x7f0000000280)=""/218, 0xda) read$msr(r7, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x30) 01:24:18 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x10, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r3) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r4, &(0x7f0000000280)=""/218, 0xda) read$msr(r4, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x10, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) select(0x40, &(0x7f0000000000)={0xffffffffffffff14, 0x2, 0x9, 0x8, 0x3, 0xfef, 0x36, 0x7fffffff}, &(0x7f0000000280)={0x4, 0x7fffffffffffffff, 0xe31d, 0x2, 0x20, 0x76, 0x7fff, 0x2}, &(0x7f00000002c0)={0xce00000000000000, 0x6, 0x7fff, 0x8001, 0xe67, 0x5, 0x7f, 0x1}, &(0x7f0000000300)={0x0, 0xea60}) 01:24:18 executing program 0: syz_io_uring_complete(0x0) (async) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0xa0) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xf3}}, 0x10) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x9, 0x80000001, "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", 0x20, 0x1f, 0x9, 0x20, 0x40, 0xf2, 0x9, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 2: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 01:24:18 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x10, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) (async) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x10, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r4, &(0x7f0000000280)=""/218, 0xda) read$msr(r4, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1, 0x4, 0x4, 0x0, "e951de4ce67f3f7fb3e51a32b4830b1715954e9745067fd4c81a856ba18ef23b0c87ce0a3923b3ca161ed29130ad20d334e90ba20a6a01ad4606f4a4472f43d1", "990cb870c3de36649845898f8be0387120ea1de81acda1687fb3b05ef5300354", [0x4, 0x486]}) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xfff) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:18 executing program 2: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x1, 0x2000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000300)) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000040)={{&(0x7f00000000c0)=""/181, 0xb5}}, 0x20) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x4, 0x0) read$msr(r0, &(0x7f0000000040)=""/121, 0x79) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x2f, 0x6, 0x1, 0x100, 0x20, @loopback, @loopback, 0x20, 0x7, 0x0, 0xa2}}) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffff}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}, @generic={0x20, 0x9, 0x9, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x7, 0x6, 0x7ff, 0x58}, @jmp={0x5, 0x1, 0x3, 0x9, 0x9, 0x40, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0xb0, &(0x7f0000000640)=""/176, 0x20980, 0x41, '\x00', r2, 0x8, r1, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x4, 0x2, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x2, &(0x7f00000003c0)=[r3], &(0x7f0000000400)=[{0x1, 0x2, 0xb}, {0x3, 0x2, 0x4, 0x6}], 0x10, 0x8}, 0x90) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000100)=[0x7fffffff, 0x389f, 0x3, 0x40002, 0xc2, 0x12, 0x6, 0x7fff]) r4 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r3, &(0x7f0000000280)=""/218, 0xda) read$msr(r3, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xf3}}, 0x10) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x9, 0x80000001, "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", 0x20, 0x1f, 0x9, 0x20, 0x40, 0xf2, 0x9, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xf3}}, 0x10) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x9, 0x80000001, "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", 0x20, 0x1f, 0x9, 0x20, 0x40, 0xf2, 0x9, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1, 0x4, 0x4, 0x0, "e951de4ce67f3f7fb3e51a32b4830b1715954e9745067fd4c81a856ba18ef23b0c87ce0a3923b3ca161ed29130ad20d334e90ba20a6a01ad4606f4a4472f43d1", "990cb870c3de36649845898f8be0387120ea1de81acda1687fb3b05ef5300354", [0x4, 0x486]}) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xfff) (async) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xfff) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r3, &(0x7f0000000280)=""/218, 0xda) read$msr(r3, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x4, 0x0) read$msr(r0, &(0x7f0000000040)=""/121, 0x79) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x2f, 0x6, 0x1, 0x100, 0x20, @loopback, @loopback, 0x20, 0x7, 0x0, 0xa2}}) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffff}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}, @generic={0x20, 0x9, 0x9, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x7, 0x6, 0x7ff, 0x58}, @jmp={0x5, 0x1, 0x3, 0x9, 0x9, 0x40, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0xb0, &(0x7f0000000640)=""/176, 0x20980, 0x41, '\x00', r2, 0x8, r1, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x4, 0x2, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x2, &(0x7f00000003c0)=[r3], &(0x7f0000000400)=[{0x1, 0x2, 0xb}, {0x3, 0x2, 0x4, 0x6}], 0x10, 0x8}, 0x90) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000100)=[0x7fffffff, 0x389f, 0x3, 0x40002, 0xc2, 0x12, 0x6, 0x7fff]) r4 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) 01:24:18 executing program 2: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f00000002c0), 0x1, 0x2000) (async) r1 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x1, 0x2000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000300)) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000040)={{&(0x7f00000000c0)=""/181, 0xb5}}, 0x20) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000380), 0x80) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f0000000280)=""/95, 0x5f}, &(0x7f0000000300), 0x51}, 0x20) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x8001) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xf3}}, 0x10) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x9, 0x80000001, "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", 0x20, 0x1f, 0x9, 0x20, 0x40, 0xf2, 0x9, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1, 0x4, 0x4, 0x0, "e951de4ce67f3f7fb3e51a32b4830b1715954e9745067fd4c81a856ba18ef23b0c87ce0a3923b3ca161ed29130ad20d334e90ba20a6a01ad4606f4a4472f43d1", "990cb870c3de36649845898f8be0387120ea1de81acda1687fb3b05ef5300354", [0x4, 0x486]}) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xfff) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async) syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) (async) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) (async) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1, 0x4, 0x4, 0x0, "e951de4ce67f3f7fb3e51a32b4830b1715954e9745067fd4c81a856ba18ef23b0c87ce0a3923b3ca161ed29130ad20d334e90ba20a6a01ad4606f4a4472f43d1", "990cb870c3de36649845898f8be0387120ea1de81acda1687fb3b05ef5300354", [0x4, 0x486]}) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xfff) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:18 executing program 2: ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x1, 0x2000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000300)) (async) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000040)={{&(0x7f00000000c0)=""/181, 0xb5}}, 0x20) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r3, &(0x7f0000000280)=""/218, 0xda) read$msr(r3, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x4, 0x0) read$msr(r0, &(0x7f0000000040)=""/121, 0x79) syz_io_uring_complete(0x0) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x2f, 0x6, 0x1, 0x100, 0x20, @loopback, @loopback, 0x20, 0x7, 0x0, 0xa2}}) syz_io_uring_complete(0x0) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffff}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x2c}, @generic={0x20, 0x9, 0x9, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x7, 0x6, 0x7ff, 0x58}, @jmp={0x5, 0x1, 0x3, 0x9, 0x9, 0x40, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0xb0, &(0x7f0000000640)=""/176, 0x20980, 0x41, '\x00', r2, 0x8, r1, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x4, 0x2, 0x1}, 0x10, 0xffffffffffffffff, r1, 0x2, &(0x7f00000003c0)=[r3], &(0x7f0000000400)=[{0x1, 0x2, 0xb}, {0x3, 0x2, 0x4, 0x6}], 0x10, 0x8}, 0x90) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000100)=[0x7fffffff, 0x389f, 0x3, 0x40002, 0xc2, 0x12, 0x6, 0x7fff]) syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async) r4 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000140), 0x7, 0x202400) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, r5, 0x10, 0x0, @in6={0xa, 0x4e21, 0x4b6, @private2, 0x401}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x8000}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f0000000280)=""/95, 0x5f}, &(0x7f0000000300), 0x51}, 0x20) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x8001) (async) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x9) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r4) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000000)=""/64, 0x40}, &(0x7f0000000040), 0x30}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0xa3, "229d84", "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"}}, 0x110) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_OPENAT2={0x1c, 0x18, 0x0, r2, &(0x7f0000000100)={0x4000}, &(0x7f0000000140)='./file0\x00', 0x18, 0x0, 0x12345}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x2}}, 0x18) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$vcsu(&(0x7f0000000140), 0x7, 0x202400) (async) r3 = syz_open_dev$vcsu(&(0x7f0000000140), 0x7, 0x202400) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, r5, 0x10, 0x0, @in6={0xa, 0x4e21, 0x4b6, @private2, 0x401}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x8000}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/218, 0xda) read$msr(r1, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x4, 0x2000, @fd_index=0x1, 0xffffffffffffffff, &(0x7f00000000c0)="f2e9682b14554d5439cc451edf7285a579c00b6cf66d7205bea63c6bb89cd012c2ec3fbe00df7f0c918e1280f51df40d4042029aa6e031b88388129374956904b7bdd2896a9b7f63935632d051c23bd4acda1a5ebe2ccf7a5ced9674421cf9c97ab3b6f62c90b1a2b7b3acdb43fb77df5d1961c13d972b4b38ae847e1c9101c597ece452d143be3b89ac52ced0466e337f2cb32b1fff52b6a1ecf94510f5cbcb77142ec22ef065", 0xa7, 0x10}) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x96, 0x2, 0x6, 0x0, 0x9, 0x48882, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x81, 0x8, 0x8, 0x8, 0x1, 0x8, 0x0, 0x8000, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) (async) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_OPENAT2={0x1c, 0x18, 0x0, r2, &(0x7f0000000100)={0x4000}, &(0x7f0000000140)='./file0\x00', 0x18, 0x0, 0x12345}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x2}}, 0x18) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x9) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r4 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r4) (async) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000000)=""/64, 0x40}, &(0x7f0000000040), 0x30}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0xa3, "229d84", "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"}}, 0x110) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000380), 0x80) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f0000000280)=""/95, 0x5f}, &(0x7f0000000300), 0x51}, 0x20) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x8001) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f0000000280)=""/95, 0x5f}, &(0x7f0000000300), 0x51}, 0x20) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)=0x8001) (async) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) (async) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = syz_open_dev$vcsu(&(0x7f0000000140), 0x7, 0x202400) (async) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, r5, 0x10, 0x0, @in6={0xa, 0x4e21, 0x4b6, @private2, 0x401}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r7, 0x8000}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x4, 0x2000, @fd_index=0x1, 0xffffffffffffffff, &(0x7f00000000c0)="f2e9682b14554d5439cc451edf7285a579c00b6cf66d7205bea63c6bb89cd012c2ec3fbe00df7f0c918e1280f51df40d4042029aa6e031b88388129374956904b7bdd2896a9b7f63935632d051c23bd4acda1a5ebe2ccf7a5ced9674421cf9c97ab3b6f62c90b1a2b7b3acdb43fb77df5d1961c13d972b4b38ae847e1c9101c597ece452d143be3b89ac52ced0466e337f2cb32b1fff52b6a1ecf94510f5cbcb77142ec22ef065", 0xa7, 0x10}) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x96, 0x2, 0x6, 0x0, 0x9, 0x48882, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x81, 0x8, 0x8, 0x8, 0x1, 0x8, 0x0, 0x8000, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 01:24:18 executing program 3: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x4, 0x2000, @fd_index=0x1, 0xffffffffffffffff, &(0x7f00000000c0)="f2e9682b14554d5439cc451edf7285a579c00b6cf66d7205bea63c6bb89cd012c2ec3fbe00df7f0c918e1280f51df40d4042029aa6e031b88388129374956904b7bdd2896a9b7f63935632d051c23bd4acda1a5ebe2ccf7a5ced9674421cf9c97ab3b6f62c90b1a2b7b3acdb43fb77df5d1961c13d972b4b38ae847e1c9101c597ece452d143be3b89ac52ced0466e337f2cb32b1fff52b6a1ecf94510f5cbcb77142ec22ef065", 0xa7, 0x10}) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x96, 0x2, 0x6, 0x0, 0x9, 0x48882, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x81, 0x8, 0x8, 0x8, 0x1, 0x8, 0x0, 0x8000, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x4, 0x2000, @fd_index=0x1, 0xffffffffffffffff, &(0x7f00000000c0)="f2e9682b14554d5439cc451edf7285a579c00b6cf66d7205bea63c6bb89cd012c2ec3fbe00df7f0c918e1280f51df40d4042029aa6e031b88388129374956904b7bdd2896a9b7f63935632d051c23bd4acda1a5ebe2ccf7a5ced9674421cf9c97ab3b6f62c90b1a2b7b3acdb43fb77df5d1961c13d972b4b38ae847e1c9101c597ece452d143be3b89ac52ced0466e337f2cb32b1fff52b6a1ecf94510f5cbcb77142ec22ef065", 0xa7, 0x10}) (async) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x2, 0x96, 0x2, 0x6, 0x0, 0x9, 0x48882, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x81, 0x8, 0x8, 0x8, 0x1, 0x8, 0x0, 0x8000, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) (async) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_OPENAT2={0x1c, 0x18, 0x0, r2, &(0x7f0000000100)={0x4000}, &(0x7f0000000140)='./file0\x00', 0x18, 0x0, 0x12345}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x2}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) (async) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_OPENAT2={0x1c, 0x18, 0x0, r2, &(0x7f0000000100)={0x4000}, &(0x7f0000000140)='./file0\x00', 0x18, 0x0, 0x12345}) (async) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x2}}, 0x18) (async) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x9) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r4 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r4) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000000)=""/64, 0x40}, &(0x7f0000000040), 0x30}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0xa3, "229d84", "0b8607bb33f12fbb7efde5e491b7e378fa5f1ce4c6f87d180fe9c328c1a6813eef2356b84e2aadec8c6c03150f5fd25ddaaca8df2c1c0ce896e0eb3b458fdb4a0fb72a6d66906987cdf6890841365d19aea2b749bbddd0c606a91ba736d57b46fb01abbdecb3e0755688a1f15c20b84d3aa29d65c4b882162562300ff6cc5f29a21bc1af0a4b79d94253c2827ddd9e5873b5d4609d720a4da919c689dba099ef9fa6dbdbb24b49e56843af2732a18be32e36602398a51c6609a685835433b49f89a8aa2dcac98441defd964c881ec4fd786918a8b61eb331410b6b73a1be018010ed074303c6e6a60d166aed9923dabf55658cd88e1806b5a811ef3efce945b7"}}, 0x110) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) r2 = socket(0x24, 0xa, 0x9b) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x7}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r3, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4c004) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0x0, 0x1}, 0x6) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) (rerun: 32) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) r2 = socket(0x24, 0xa, 0x9b) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r3, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4c004) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0x0, 0x1}, 0x6) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) r1 = syz_io_uring_complete(0x0) (async, rerun: 32) r2 = socket(0x24, 0xa, 0x9b) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r3, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4c004) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) socket(0x10, 0x2, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r3, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfe}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4c004) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0x0, 0x1}, 0x6) 01:24:18 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 01:24:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x1, 0x48a1c2) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x4, 0x4) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:18 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x1}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/97, 0x61}, {0x0}], 0x2, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() getpgid(r1) r2 = getpid() getpgid(r2) getpgid(r2) getpgid(r0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/13, 0xd}, {&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/18, 0x12}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/13, 0xd}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x7, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)=""/245, 0xf5}], 0x3, 0x0) r4 = syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) syz_io_uring_setup(0xae8, &(0x7f0000000680)={0x0, 0xe6c9, 0x1, 0x0, 0x6a}, &(0x7f0000000700), &(0x7f0000000740)=0x0) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000780)=0xffffffffffffffff, 0x4) syz_io_uring_submit(0x0, r5, &(0x7f00000007c0)=@IORING_OP_TEE={0x21, 0x8, 0x0, @fd=r4, 0x0, 0x0, 0x8, 0x3, 0x1, {0x0, 0x0, r6}}) syz_open_dev$MSR(&(0x7f0000000040), 0x100000001, 0x0) r7 = getpid() perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x3, 0x0, 0xfe, 0x40, 0x0, 0x5, 0x40, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x7, 0x800}, 0x94501, 0x8, 0x9, 0x7, 0x0, 0x200, 0x1f, 0x0, 0x9, 0x0, 0x3ff}, r7, 0x2, 0xffffffffffffffff, 0x2) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) read$msr(r1, &(0x7f0000000080)=""/233, 0xe9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 3: process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/97, 0x61}, {0x0}], 0x2, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() getpgid(r1) r2 = getpid() getpgid(r2) getpgid(r2) (async) getpgid(r0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/13, 0xd}, {&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/18, 0x12}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/13, 0xd}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x7, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)=""/245, 0xf5}], 0x3, 0x0) (async) r4 = syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) (async) syz_io_uring_setup(0xae8, &(0x7f0000000680)={0x0, 0xe6c9, 0x1, 0x0, 0x6a}, &(0x7f0000000700), &(0x7f0000000740)=0x0) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000780)=0xffffffffffffffff, 0x4) syz_io_uring_submit(0x0, r5, &(0x7f00000007c0)=@IORING_OP_TEE={0x21, 0x8, 0x0, @fd=r4, 0x0, 0x0, 0x8, 0x3, 0x1, {0x0, 0x0, r6}}) (async) syz_open_dev$MSR(&(0x7f0000000040), 0x100000001, 0x0) (async) r7 = getpid() perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x3, 0x0, 0xfe, 0x40, 0x0, 0x5, 0x40, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x7, 0x800}, 0x94501, 0x8, 0x9, 0x7, 0x0, 0x200, 0x1f, 0x0, 0x9, 0x0, 0x3ff}, r7, 0x2, 0xffffffffffffffff, 0x2) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x1, 0x48a1c2) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x4, 0x4) (async, rerun: 32) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) 01:24:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) read$msr(r1, &(0x7f0000000080)=""/233, 0xe9) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:18 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x1, 0x48a1c2) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x4, 0x4) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:18 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) (async) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 3: process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/97, 0x61}, {0x0}], 0x2, 0x0, 0x0, 0x0) r0 = getpid() getpid() (async) r1 = getpid() getpgid(r1) r2 = getpid() getpgid(r2) (async) getpgid(r2) getpgid(r2) (async) getpgid(r2) getpgid(r0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/13, 0xd}, {&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/18, 0x12}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/13, 0xd}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x7, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)=""/245, 0xf5}], 0x3, 0x0) (async) process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/13, 0xd}, {&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/18, 0x12}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/13, 0xd}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x7, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)=""/245, 0xf5}], 0x3, 0x0) r4 = syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) syz_io_uring_setup(0xae8, &(0x7f0000000680)={0x0, 0xe6c9, 0x1, 0x0, 0x6a}, &(0x7f0000000700), &(0x7f0000000740)) (async) syz_io_uring_setup(0xae8, &(0x7f0000000680)={0x0, 0xe6c9, 0x1, 0x0, 0x6a}, &(0x7f0000000700), &(0x7f0000000740)=0x0) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000780)=0xffffffffffffffff, 0x4) syz_io_uring_submit(0x0, r5, &(0x7f00000007c0)=@IORING_OP_TEE={0x21, 0x8, 0x0, @fd=r4, 0x0, 0x0, 0x8, 0x3, 0x1, {0x0, 0x0, r6}}) syz_open_dev$MSR(&(0x7f0000000040), 0x100000001, 0x0) r7 = getpid() perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x3, 0x0, 0xfe, 0x40, 0x0, 0x5, 0x40, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x7, 0x800}, 0x94501, 0x8, 0x9, 0x7, 0x0, 0x200, 0x1f, 0x0, 0x9, 0x0, 0x3ff}, r7, 0x2, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x3, 0x0, 0xfe, 0x40, 0x0, 0x5, 0x40, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x7, 0x800}, 0x94501, 0x8, 0x9, 0x7, 0x0, 0x200, 0x1f, 0x0, 0x9, 0x0, 0x3ff}, r7, 0x2, 0xffffffffffffffff, 0x2) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) read$msr(r1, &(0x7f0000000080)=""/233, 0xe9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) (async) read$msr(r1, &(0x7f0000000080)=""/233, 0xe9) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x5, 0x6, 0x9, 0x40, 0x0, 0xffffffff00000001, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x85ee, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2240, 0xfffffffffffffc01, 0x7f, 0x6, 0x4000000000, 0xff, 0x2, 0x0, 0x1}, r0, 0x6, r0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 3: epoll_create1(0x0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x5, 0x6, 0x9, 0x40, 0x0, 0xffffffff00000001, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x85ee, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2240, 0xfffffffffffffc01, 0x7f, 0x6, 0x4000000000, 0xff, 0x2, 0x0, 0x1}, r0, 0x6, r0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x5, 0x6, 0x9, 0x40, 0x0, 0xffffffff00000001, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x85ee, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2240, 0xfffffffffffffc01, 0x7f, 0x6, 0x4000000000, 0xff, 0x2, 0x0, 0x1}, r0, 0x6, r0, 0x2) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 2: r0 = syz_io_uring_complete(0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0xed3, [0x80, 0x5], 0x5}, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 3: epoll_create1(0x0) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x5, 0x6, 0x9, 0x40, 0x0, 0xffffffff00000001, 0x400, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x85ee, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2240, 0xfffffffffffffc01, 0x7f, 0x6, 0x4000000000, 0xff, 0x2, 0x0, 0x1}, r0, 0x6, r0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 2: r0 = syz_io_uring_complete(0x0) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0xed3, [0x80, 0x5], 0x5}, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 3: epoll_create1(0x0) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f, 0x6}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "b315db03cb6f2a8eca5e788a395bc7359a1b7a772e7a2c88fc40b009a98df93b48c4fb188574a62470671a617b28569a4869dbb455eda780f9bea0fa0643c50fe42c0ce28a72908507797f3cbe4c20901eb798b0fa037bc1ba847ef060f5cc152d181c97d2df43a9e3c8bb83f7c6976f0e650dae9f256dbf5f3d8ba0e3e12ae6c3b6be608dfd1dce690cb07808ed9b1f5c4bbf73c9d2ded91cb86551906836c66f2e6587e853e13bfcd90670f21c69786222003d0500f16b38eb4eb0799b307d17fff7da9b485e0c951fe2a4712df28169422a17d5c98873775f860e6c8e4c544cd3b0741b377d1c37a8a944620b76124b6353c54db1249689fb15504bfd6b00", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x18) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='thread_noise\x00', r0}, 0x10) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 2: r0 = syz_io_uring_complete(0x0) socket$l2tp(0x2, 0x2, 0x73) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0xed3, [0x80, 0x5], 0x5}, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_io_uring_complete(0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0xed3, [0x80, 0x5], 0x5}, 0x10) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f8, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0xffffffff}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x18) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='thread_noise\x00', r0}, 0x10) 01:24:19 executing program 3: r0 = getpid() r1 = getpid() process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/87, 0x57}, {&(0x7f0000000080)=""/255, 0xff}, {&(0x7f0000000180)=""/132, 0x84}], 0x3, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/3, 0x3}], 0x1, 0x0) r2 = getpid() r3 = getpgid(r2) r4 = getpgid(0xffffffffffffffff) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000300)=0x1, 0x4) getpgrp(r4) sendmsg$rds(r5, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/224, 0xe0}, {&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/35, 0x23}, {&(0x7f0000001640)=""/243, 0xf3}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/1, 0x1}, {&(0x7f0000001880)=""/176, 0xb0}], 0x9, &(0x7f0000001a00)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xffff6248}], 0x18, 0x80}, 0x4008050) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, 0x0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r6 = geteuid() r7 = getpid() getpgid(r7) getpid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3, 0xee00, 0xee01, r6, 0xffffffffffffffff, 0x2, 0x101}, 0xfffff0d2, 0x100, 0x2, 0x3f, r7, r3, 0x8}) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=r1, r0, 0x2c, 0x0, r2}, 0x14) syz_open_dev$vcsu(&(0x7f0000000000), 0x80000001, 0x8f7c9dc36e8f360a) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) (async) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 3: getpid() (async) r0 = getpid() r1 = getpid() process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/87, 0x57}, {&(0x7f0000000080)=""/255, 0xff}, {&(0x7f0000000180)=""/132, 0x84}], 0x3, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/3, 0x3}], 0x1, 0x0) r2 = getpid() r3 = getpgid(r2) r4 = getpgid(0xffffffffffffffff) socket$rds(0x15, 0x5, 0x0) (async) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000300)=0x1, 0x4) (async) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000300)=0x1, 0x4) getpgrp(r4) sendmsg$rds(r5, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/224, 0xe0}, {&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/35, 0x23}, {&(0x7f0000001640)=""/243, 0xf3}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/1, 0x1}, {&(0x7f0000001880)=""/176, 0xb0}], 0x9, &(0x7f0000001a00)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xffff6248}], 0x18, 0x80}, 0x4008050) (async) sendmsg$rds(r5, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/224, 0xe0}, {&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/35, 0x23}, {&(0x7f0000001640)=""/243, 0xf3}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/1, 0x1}, {&(0x7f0000001880)=""/176, 0xb0}], 0x9, &(0x7f0000001a00)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xffff6248}], 0x18, 0x80}, 0x4008050) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, 0x0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) geteuid() (async) r6 = geteuid() r7 = getpid() getpgid(r7) getpid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3, 0xee00, 0xee01, r6, 0xffffffffffffffff, 0x2, 0x101}, 0xfffff0d2, 0x100, 0x2, 0x3f, r7, r3, 0x8}) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=r1, r0, 0x2c, 0x0, r2}, 0x14) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x80000001, 0x8f7c9dc36e8f360a) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f8, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0xffffffff}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x18) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='thread_noise\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='thread_noise\x00', r0}, 0x10) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @private1, 0x3f}, {0xa, 0x4e23, 0x401, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x34}}, 0x9}, r1, 0x5}}, 0x48) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/consoles\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x4, r5, 0x0, 0x1, @ib={0x1b, 0x4, 0xc0, {"11c509a2e5703f6f6c08daaeabd4d97b"}, 0x77e, 0x7, 0x800}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, 0x0, 0x0) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=r1, r0, 0x2c, 0x0, r2}, 0x14) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=r1, r0, 0x2c, 0x0, r2}, 0x14) syz_open_dev$vcsu(&(0x7f0000000000), 0x80000001, 0x8f7c9dc36e8f360a) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000240)=""/188, 0xbc) 01:24:19 executing program 3: r0 = getpid() r1 = getpid() process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/87, 0x57}, {&(0x7f0000000080)=""/255, 0xff}, {&(0x7f0000000180)=""/132, 0x84}], 0x3, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/3, 0x3}], 0x1, 0x0) r2 = getpid() r3 = getpgid(r2) r4 = getpgid(0xffffffffffffffff) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000300)=0x1, 0x4) getpgrp(r4) sendmsg$rds(r5, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/224, 0xe0}, {&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/35, 0x23}, {&(0x7f0000001640)=""/243, 0xf3}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/1, 0x1}, {&(0x7f0000001880)=""/176, 0xb0}], 0x9, &(0x7f0000001a00)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xffff6248}], 0x18, 0x80}, 0x4008050) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, 0x0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r6 = geteuid() r7 = getpid() getpgid(r7) getpid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3, 0xee00, 0xee01, r6, 0xffffffffffffffff, 0x2, 0x101}, 0xfffff0d2, 0x100, 0x2, 0x3f, r7, r3, 0x8}) getpid() (async) getpid() (async) process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/87, 0x57}, {&(0x7f0000000080)=""/255, 0xff}, {&(0x7f0000000180)=""/132, 0x84}], 0x3, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/3, 0x3}], 0x1, 0x0) (async) getpid() (async) getpgid(r2) (async) getpgid(0xffffffffffffffff) (async) socket$rds(0x15, 0x5, 0x0) (async) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000300)=0x1, 0x4) (async) getpgrp(r4) (async) sendmsg$rds(r5, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/224, 0xe0}, {&(0x7f0000000540)=""/77, 0x4d}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/35, 0x23}, {&(0x7f0000001640)=""/243, 0xf3}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/1, 0x1}, {&(0x7f0000001880)=""/176, 0xb0}], 0x9, &(0x7f0000001a00)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xffff6248}], 0x18, 0x80}, 0x4008050) (async) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, 0x0) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) geteuid() (async) getpid() (async) getpgid(r7) (async) getpid() (async) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3, 0xee00, 0xee01, r6, 0xffffffffffffffff, 0x2, 0x101}, 0xfffff0d2, 0x100, 0x2, 0x3f, r7, r3, 0x8}) (async) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f8, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0xffffffff}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85f8, 0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0xffffffff}}, 0x18) (async) 01:24:19 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @private1, 0x3f}, {0xa, 0x4e23, 0x401, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x34}}, 0x9}, r1, 0x5}}, 0x48) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/consoles\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x4, r5, 0x0, 0x1, @ib={0x1b, 0x4, 0xc0, {"11c509a2e5703f6f6c08daaeabd4d97b"}, 0x77e, 0x7, 0x800}}}, 0xa0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000240)=""/188, 0xbc) 01:24:19 executing program 0: r0 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, 0x0, 0x0) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x2a, 0xfa00, {0x0, r1, 0x2}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000240)=""/188, 0xbc) 01:24:19 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @private1, 0x3f}, {0xa, 0x4e23, 0x401, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x34}}, 0x9}, r1, 0x5}}, 0x48) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/consoles\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x4, r5, 0x0, 0x1, @ib={0x1b, 0x4, 0xc0, {"11c509a2e5703f6f6c08daaeabd4d97b"}, 0x77e, 0x7, 0x800}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/218, 0xda) read$msr(r0, 0x0, 0x0) 01:24:19 executing program 0: r0 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x2a, 0xfa00, {0x0, r1, 0x2}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x2a, 0xfa00, {0x0, r1, 0x2}}, 0x18) (async) 01:24:19 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=0x1, 0xffffffffffffffff, 0x1a}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2000002, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0xfffffffffffffe58) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x6e) 01:24:19 executing program 0: r0 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socket(0x29, 0x2, 0x400) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) (async) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x2a, 0xfa00, {0x0, r1, 0x2}}, 0x18) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) syz_io_uring_complete(0x0) syz_open_dev$vcsu(&(0x7f0000000000), 0x200, 0x4000) syz_open_dev$MSR(&(0x7f0000000280), 0x4, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) read$msr(r1, &(0x7f0000000180)=""/195, 0xc3) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0xf2f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @ib={0x1b, 0x2, 0x2, {"7ef628d4b25b453cef8220c19c141217"}, 0xffffffffffffffe0, 0x40, 0x1000}}}, 0x118) 01:24:19 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) syz_open_dev$MSR(&(0x7f00000005c0), 0x2, 0x0) (async) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) (async) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=0x1, 0xffffffffffffffff, 0x1a}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2000002, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0xfffffffffffffe58) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x6e) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 2: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0x80, 0x0, 0x8, 0x2, 0x0, 0x6, 0x10061, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x400, 0x1ff}, 0x420, 0x81, 0xf952, 0x6, 0x10001, 0x101, 0x7ff, 0x0, 0x6, 0x0, 0x6}) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) syz_io_uring_complete(0x0) syz_open_dev$vcsu(&(0x7f0000000000), 0x200, 0x4000) (async) syz_open_dev$MSR(&(0x7f0000000280), 0x4, 0x0) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) read$msr(r1, &(0x7f0000000180)=""/195, 0xc3) 01:24:19 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) 01:24:19 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0xf2f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @ib={0x1b, 0x2, 0x2, {"7ef628d4b25b453cef8220c19c141217"}, 0xffffffffffffffe0, 0x40, 0x1000}}}, 0x118) 01:24:19 executing program 2: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0x80, 0x0, 0x8, 0x2, 0x0, 0x6, 0x10061, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x400, 0x1ff}, 0x420, 0x81, 0xf952, 0x6, 0x10001, 0x101, 0x7ff, 0x0, 0x6, 0x0, 0x6}) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@map=0x1, 0xffffffffffffffff, 0x1a}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2000002, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0xfffffffffffffe58) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x6e) 01:24:19 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async, rerun: 32) syz_io_uring_complete(0x0) (rerun: 32) syz_open_dev$vcsu(&(0x7f0000000000), 0x200, 0x4000) (async) syz_open_dev$MSR(&(0x7f0000000280), 0x4, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) read$msr(r1, &(0x7f0000000180)=""/195, 0xc3) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0xf2f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @ib={0x1b, 0x2, 0x2, {"7ef628d4b25b453cef8220c19c141217"}, 0xffffffffffffffe0, 0x40, 0x1000}}}, 0x118) 01:24:19 executing program 2: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0x80, 0x0, 0x8, 0x2, 0x0, 0x6, 0x10061, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x400, 0x1ff}, 0x420, 0x81, 0xf952, 0x6, 0x10001, 0x101, 0x7ff, 0x0, 0x6, 0x0, 0x6}) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0x80, 0x0, 0x8, 0x2, 0x0, 0x6, 0x10061, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x400, 0x1ff}, 0x420, 0x81, 0xf952, 0x6, 0x10001, 0x101, 0x7ff, 0x0, 0x6, 0x0, 0x6}) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) (async) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, &(0x7f0000000480)) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 2: syz_io_uring_complete(0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = syz_io_uring_complete(0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000000c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f00000000c0)}, &(0x7f0000000100), 0x4b}, 0x20) r3 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r3) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000000)=0x3, 0x4) 01:24:19 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xffff, 0x0, @private1}, r1, 0xff}}, 0x48) 01:24:19 executing program 2: syz_io_uring_complete(0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = syz_io_uring_complete(0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000000c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f00000000c0)}, &(0x7f0000000100), 0x4b}, 0x20) r3 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r3) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000000)=0x3, 0x4) syz_io_uring_complete(0x0) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) (async) syz_io_uring_complete(0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000000c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f00000000c0)}, &(0x7f0000000100), 0x4b}, 0x20) (async) socket(0x29, 0x2, 0x400) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r3) (async) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000000)=0x3, 0x4) (async) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/stat\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x6000446) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d5, &(0x7f00000003c0)="32c50f115e40c8e31e7d79ceb236296b4f6466b627eee721996c2ef4e3da9a8d65aa375c85aaed16236d34e6a468a16a463062bd4b00766ab068176b35aa403360e5cf8ab576f177b01212026db5b5363faab192c5d3e8eb3851acd86892266e3a0a39444a481caeacbb") read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r3) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000325bd7000fcdbdf252e08000006000400a0aa00000a0001007770616e31000000e032567cbbfbc858b86b4da1cdbad9e2969bcc9c3cce2ec909c7b2f821092f63f47cf3d78d12d0f2eddb742104f3538f02cbd5357cc471fa1415b12c700a8ba88107a20bd1259a46016be5c9b8989865cd0d12d947880dcf5f3111d0141aa554d25b48568c0700000012f58b21936930ac5f719b44b4a2d4b358c63a7ff22233cfee7e81abd7799d619e0ac2b2a497a6e5bc9c9c5e5c846837d2bbaa2328883f9e5041419db167afde40ac37281cb77e8cb18f1b"], 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x800) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x7ff, 0x3}, 0x74}, 0x10) 01:24:19 executing program 3: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0xfffffffa}, 0x4) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x4, 0x9, 0x7, 0x0, r0, 0x1040, '\x00', r6, r0, 0x5, 0x5, 0x4}, 0x48) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r3}}, 0x18) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0xfffffffd, "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", 0xff, 0x81, 0xba, 0xd, 0x40, 0x40, 0xcc, 0x1}, r4}}, 0x128) 01:24:19 executing program 2: syz_io_uring_complete(0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = syz_io_uring_complete(0x0) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 32) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000000c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async, rerun: 32) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f00000000c0)}, &(0x7f0000000100), 0x4b}, 0x20) (async) r3 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r3) (async) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000000)=0x3, 0x4) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x4, 0x9, 0x7, 0x0, r0, 0x1040, '\x00', r6, r0, 0x5, 0x5, 0x4}, 0x48) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r3}}, 0x18) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x8000000}, {0xa, 0x0, 0x0, @private1}, r1, 0x4}}, 0x48) r4 = syz_open_dev$vcsu(&(0x7f0000000380), 0x8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b740", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r8, 0x10, 0x0, @ib={0x1b, 0xaa, 0xbc4a, {"172b540f105e99f0b0c205cbbe59bf5e"}, 0x401, 0xfa, 0x80000001}}}, 0x90) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x6}, r6}}, 0x30) 01:24:19 executing program 3: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0xfffffffa}, 0x4) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r7, &(0x7f0000000440)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x1, {0xa, 0x4e21, 0x7ff, @loopback, 0xc17}, r8}}, 0x38) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x800}}, 0x10) 01:24:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/stat\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x6000446) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d5, &(0x7f00000003c0)="32c50f115e40c8e31e7d79ceb236296b4f6466b627eee721996c2ef4e3da9a8d65aa375c85aaed16236d34e6a468a16a463062bd4b00766ab068176b35aa403360e5cf8ab576f177b01212026db5b5363faab192c5d3e8eb3851acd86892266e3a0a39444a481caeacbb") read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r3) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000325bd7000fcdbdf252e08000006000400a0aa00000a0001007770616e31000000e032567cbbfbc858b86b4da1cdbad9e2969bcc9c3cce2ec909c7b2f821092f63f47cf3d78d12d0f2eddb742104f3538f02cbd5357cc471fa1415b12c700a8ba88107a20bd1259a46016be5c9b8989865cd0d12d947880dcf5f3111d0141aa554d25b48568c0700000012f58b21936930ac5f719b44b4a2d4b358c63a7ff22233cfee7e81abd7799d619e0ac2b2a497a6e5bc9c9c5e5c846837d2bbaa2328883f9e5041419db167afde40ac37281cb77e8cb18f1b"], 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x800) (async, rerun: 64) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x7ff, 0x3}, 0x74}, 0x10) (rerun: 64) 01:24:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x8000000}, {0xa, 0x0, 0x0, @private1}, r1, 0x4}}, 0x48) r4 = syz_open_dev$vcsu(&(0x7f0000000380), 0x8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x2, 0x1}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (rerun: 64) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b740", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r8, 0x10, 0x0, @ib={0x1b, 0xaa, 0xbc4a, {"172b540f105e99f0b0c205cbbe59bf5e"}, 0x401, 0xfa, 0x80000001}}}, 0x90) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x6}, r6}}, 0x30) 01:24:19 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x4, 0x9, 0x7, 0x0, r0, 0x1040, '\x00', r6, r0, 0x5, 0x5, 0x4}, 0x48) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r3}}, 0x18) 01:24:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0x1}}, 0x20) 01:24:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x800}}, 0x10) 01:24:19 executing program 3: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0xfffffffa}, 0x4) (async) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0xfffffffa}, 0x4) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/stat\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x6000446) (async) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d5, &(0x7f00000003c0)="32c50f115e40c8e31e7d79ceb236296b4f6466b627eee721996c2ef4e3da9a8d65aa375c85aaed16236d34e6a468a16a463062bd4b00766ab068176b35aa403360e5cf8ab576f177b01212026db5b5363faab192c5d3e8eb3851acd86892266e3a0a39444a481caeacbb") read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r3) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000325bd7000fcdbdf252e08000006000400a0aa00000a0001007770616e31000000e032567cbbfbc858b86b4da1cdbad9e2969bcc9c3cce2ec909c7b2f821092f63f47cf3d78d12d0f2eddb742104f3538f02cbd5357cc471fa1415b12c700a8ba88107a20bd1259a46016be5c9b8989865cd0d12d947880dcf5f3111d0141aa554d25b48568c0700000012f58b21936930ac5f719b44b4a2d4b358c63a7ff22233cfee7e81abd7799d619e0ac2b2a497a6e5bc9c9c5e5c846837d2bbaa2328883f9e5041419db167afde40ac37281cb77e8cb18f1b"], 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x800) (async) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x7ff, 0x3}, 0x74}, 0x10) 01:24:20 executing program 3: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x100, &(0x7f0000000000)=0x4429, 0x0, 0x4) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x800}}, 0x10) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x800}}, 0x10) (async) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0xa0002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) 01:24:20 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x8000000}, {0xa, 0x0, 0x0, @private1}, r1, 0x4}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x8000000}, {0xa, 0x0, 0x0, @private1}, r1, 0x4}}, 0x48) r4 = syz_open_dev$vcsu(&(0x7f0000000380), 0x8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b740", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r8, 0x10, 0x0, @ib={0x1b, 0xaa, 0xbc4a, {"172b540f105e99f0b0c205cbbe59bf5e"}, 0x401, 0xfa, 0x80000001}}}, 0x90) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) (async) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x6}, r6}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x6}, r6}}, 0x30) 01:24:20 executing program 3: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x100, &(0x7f0000000000)=0x4429, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x100, &(0x7f0000000000)=0x4429, 0x0, 0x4) (async) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0xa0002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, r2, 0x1}}, 0x48) 01:24:20 executing program 3: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x100, &(0x7f0000000000)=0x4429, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x100, &(0x7f0000000000)=0x4429, 0x0, 0x4) (async) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0xa0002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000380)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018280000000000000000000100000000", @ANYRES32=r0, @ANYBLOB="000000000900000018680000010000000000000008000000186700000c0000000000000015ffffff18220000", @ANYRES32=r1, @ANYBLOB="00000000030000003078c0ff010000008099080005000000950000000000000040d8001001000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x1f, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000240)=[r0, r3], &(0x7f0000000280)=[{0x2, 0x4, 0xf, 0x5}, {0x4, 0x3, 0x0, 0x2}], 0x10, 0x7ff}, 0x90) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, r2, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x13f, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, r2, 0x1}}, 0x48) (async) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000380)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) syz_io_uring_complete(0x0) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018280000000000000000000100000000", @ANYRES32=r0, @ANYBLOB="000000000900000018680000010000000000000008000000186700000c0000000000000015ffffff18220000", @ANYRES32=r1, @ANYBLOB="00000000030000003078c0ff010000008099080005000000950000000000000040d8001001000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x1f, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000240)=[r0, r3], &(0x7f0000000280)=[{0x2, 0x4, 0xf, 0x5}, {0x4, 0x3, 0x0, 0x2}], 0x10, 0x7ff}, 0x90) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x0, @loopback}, {0xa, 0x4e21, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, r2, 0x1}}, 0x48) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000380)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000018280000000000000000000100000000", @ANYRES32=r0, @ANYBLOB="000000000900000018680000010000000000000008000000186700000c0000000000000015ffffff18220000", @ANYRES32=r1, @ANYBLOB="00000000030000003078c0ff010000008099080005000000950000000000000040d8001001000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000001c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x1f, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000240)=[r0, r3], &(0x7f0000000280)=[{0x2, 0x4, 0xf, 0x5}, {0x4, 0x3, 0x0, 0x2}], 0x10, 0x7ff}, 0x90) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x30) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/207, 0xcf) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'macvlan0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) r8 = socket(0x15, 0x4, 0x0) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r9, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x30) 01:24:20 executing program 2: r0 = geteuid() r1 = getpid() getpgid(r1) r2 = getpgid(0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000200)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000100)={{0x2, 0xffffffffffffffff, 0xee00, r0, 0xee01, 0xb, 0x9}, 0x0, 0x81, 0x8, 0xffff, r1, r2, 0x5}) r4 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r5 = shmget(0x2, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) r6 = geteuid() r7 = getegid() shmctl$IPC_SET(r5, 0x1, &(0x7f0000000380)={{0x2, r0, 0xffffffffffffffff, r0, r7, 0x20, 0x6}, 0x2, 0x3, 0xba65, 0x2, 0xffffffffffffffff, r1, 0x1ff}) r8 = getegid() r9 = geteuid() shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x1, r6, r8, r9, 0xee00, 0x30, 0x1f}, 0x0, 0x1, 0x4, 0xffff, r1, r2, 0x8}) r10 = getpid() getpgid(r10) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x3, &(0x7f00000002c0)) getpgrp(r10) r11 = getegid() setgid(r11) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r12 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r12) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0xcf, 0x1, 0x7ff, 0x8, @mcast1, @local, 0x8, 0x7800, 0xb04, 0x6}}) 01:24:20 executing program 2: geteuid() (async) r0 = geteuid() r1 = getpid() getpgid(r1) r2 = getpgid(0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000200)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000100)={{0x2, 0xffffffffffffffff, 0xee00, r0, 0xee01, 0xb, 0x9}, 0x0, 0x81, 0x8, 0xffff, r1, r2, 0x5}) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r4 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) shmget(0x2, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) (async) r5 = shmget(0x2, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) geteuid() (async) r6 = geteuid() r7 = getegid() shmctl$IPC_SET(r5, 0x1, &(0x7f0000000380)={{0x2, r0, 0xffffffffffffffff, r0, r7, 0x20, 0x6}, 0x2, 0x3, 0xba65, 0x2, 0xffffffffffffffff, r1, 0x1ff}) (async) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000380)={{0x2, r0, 0xffffffffffffffff, r0, r7, 0x20, 0x6}, 0x2, 0x3, 0xba65, 0x2, 0xffffffffffffffff, r1, 0x1ff}) getegid() (async) r8 = getegid() r9 = geteuid() shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x1, r6, r8, r9, 0xee00, 0x30, 0x1f}, 0x0, 0x1, 0x4, 0xffff, r1, r2, 0x8}) r10 = getpid() getpgid(r10) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x3, &(0x7f00000002c0)) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x3, &(0x7f00000002c0)) getpgrp(r10) r11 = getegid() setgid(r11) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r12 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r12) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0xcf, 0x1, 0x7ff, 0x8, @mcast1, @local, 0x8, 0x7800, 0xb04, 0x6}}) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x30) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 2: r0 = geteuid() (async) r1 = getpid() getpgid(r1) (async) r2 = getpgid(0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000200)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000100)={{0x2, 0xffffffffffffffff, 0xee00, r0, 0xee01, 0xb, 0x9}, 0x0, 0x81, 0x8, 0xffff, r1, r2, 0x5}) r4 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r5 = shmget(0x2, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) (async) r6 = geteuid() (async) r7 = getegid() shmctl$IPC_SET(r5, 0x1, &(0x7f0000000380)={{0x2, r0, 0xffffffffffffffff, r0, r7, 0x20, 0x6}, 0x2, 0x3, 0xba65, 0x2, 0xffffffffffffffff, r1, 0x1ff}) (async) r8 = getegid() r9 = geteuid() shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x1, r6, r8, r9, 0xee00, 0x30, 0x1f}, 0x0, 0x1, 0x4, 0xffff, r1, r2, 0x8}) r10 = getpid() getpgid(r10) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x3, &(0x7f00000002c0)) (async) getpgrp(r10) (async) r11 = getegid() setgid(r11) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r12 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r12) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0xcf, 0x1, 0x7ff, 0x8, @mcast1, @local, 0x8, 0x7800, 0xb04, 0x6}}) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e21, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:20 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/207, 0xcf) (async, rerun: 64) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (rerun: 64) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'macvlan0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) (async) r8 = socket(0x15, 0x4, 0x0) (async) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r9, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r4, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008000}, 0x8024) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x28, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r11 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r8) sendmsg$IEEE802154_LLSEC_DEL_KEY(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='6\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000000000002800000008000200", @ANYRES32=r10, @ANYBLOB="05002b0001000000"], 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r7, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3c}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xb592b88cac5cb168}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x40) r12 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r14 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r5) sendmsg$IEEE802154_LLSEC_DEL_KEY(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r14, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r13}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) r16 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r17 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r16, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r19 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r16) sendmsg$IEEE802154_LLSEC_DEL_KEY(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r19, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r18}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, r4, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_LEVEL={0x4c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r15}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r18}]}, 0x90}, 0x1, 0x0, 0x0, 0x18000}, 0xc4) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ac0000005304200029bd7000fbdbdf25f2d67c13c5ed405422a1a52e47ca4b3e954e51e5448773354a4bb034fe6e25f125281e5d0c0d73973522c4b0d8287c0baed9fc39e0ee4edc7c61f8fb7184da2dc0d5d990d1ace309e8a61552eae928da9328a0a00ddfb06a635e0e632e59a8d70b3eceabf2850f91fa34ac70956bc70eb2c8c8553c5702442365f71e16659b6945c32b0a2b51855ee784fdae262860a769e5fae6516da96fae000000"], 0xac}, 0x1, 0x0, 0x0, 0xc7}, 0x8841) 01:24:20 executing program 0: getpid() r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e21, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/207, 0xcf) (async) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'macvlan0\x00'}) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) (async) r8 = socket(0x15, 0x4, 0x0) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r9, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ac0000005304200029bd7000fbdbdf25f2d67c13c5ed405422a1a52e47ca4b3e954e51e5448773354a4bb034fe6e25f125281e5d0c0d73973522c4b0d8287c0baed9fc39e0ee4edc7c61f8fb7184da2dc0d5d990d1ace309e8a61552eae928da9328a0a00ddfb06a635e0e632e59a8d70b3eceabf2850f91fa34ac70956bc70eb2c8c8553c5702442365f71e16659b6945c32b0a2b51855ee784fdae262860a769e5fae6516da96fae000000"], 0xac}, 0x1, 0x0, 0x0, 0xc7}, 0x8841) 01:24:20 executing program 0: getpid() r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) getpid() (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e21, 0x0, @private1}, r1}}, 0x48) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (rerun: 64) 01:24:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r3) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r4, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008000}, 0x8024) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x28, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) (async) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x28, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r11 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r8) sendmsg$IEEE802154_LLSEC_DEL_KEY(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='6\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000000000002800000008000200", @ANYRES32=r10, @ANYBLOB="05002b0001000000"], 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r7, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3c}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xb592b88cac5cb168}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x40) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r7, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3c}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xb592b88cac5cb168}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x40) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r14 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r5) sendmsg$IEEE802154_LLSEC_DEL_KEY(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r14, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r13}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r16 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r17 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r16, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r19 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r16) sendmsg$IEEE802154_LLSEC_DEL_KEY(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r19, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r18}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r19, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r18}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, r4, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_LEVEL={0x4c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r15}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r18}]}, 0x90}, 0x1, 0x0, 0x0, 0x18000}, 0xc4) (async) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, r4, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_LEVEL={0x4c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r15}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r18}]}, 0x90}, 0x1, 0x0, 0x0, 0x18000}, 0xc4) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:20 executing program 0: getpid() r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ac0000005304200029bd7000fbdbdf25f2d67c13c5ed405422a1a52e47ca4b3e954e51e5448773354a4bb034fe6e25f125281e5d0c0d73973522c4b0d8287c0baed9fc39e0ee4edc7c61f8fb7184da2dc0d5d990d1ace309e8a61552eae928da9328a0a00ddfb06a635e0e632e59a8d70b3eceabf2850f91fa34ac70956bc70eb2c8c8553c5702442365f71e16659b6945c32b0a2b51855ee784fdae262860a769e5fae6516da96fae000000"], 0xac}, 0x1, 0x0, 0x0, 0xc7}, 0x8841) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) 01:24:20 executing program 2: r0 = socket(0x28, 0x1, 0x3) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@qipcrtr={0x2a, 0x2, 0x1}, {&(0x7f00000000c0)=""/175, 0xaf}, &(0x7f0000000040)}, 0xa0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'veth1_macvtap\x00'}) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000300)={0xb, 0x10, 0xfa00, {0x0, r4, 0x63e}}, 0x18) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x200140) socketpair(0x9, 0x5, 0x9, &(0x7f0000000140)) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000001c0)={0x5, [0x10000, 0x3ff], 0x81}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0x9}}, 0x10) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000080), 0x80) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x111, 0x1}}, 0x20) 01:24:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r2) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r3) (async) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r4, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008000}, 0x8024) (async) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000840)={0x28, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) (async) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) (async) r11 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r8) sendmsg$IEEE802154_LLSEC_DEL_KEY(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='6\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000000000002800000008000200", @ANYRES32=r10, @ANYBLOB="05002b0001000000"], 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, r7, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x3c}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xb592b88cac5cb168}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x40) (async) r12 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r14 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r5) sendmsg$IEEE802154_LLSEC_DEL_KEY(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r14, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r13}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) r16 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r17 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r16, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) (async) r19 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r16) sendmsg$IEEE802154_LLSEC_DEL_KEY(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x24, r19, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r18}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}]}, 0x24}}, 0x0) (async) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, r4, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_LEVEL={0x4c, 0x2b, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x5}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x9}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0xff}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x3f}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r15}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r18}]}, 0x90}, 0x1, 0x0, 0x0, 0x18000}, 0xc4) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x200140) (async) socketpair(0x9, 0x5, 0x9, &(0x7f0000000140)) (async) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000001c0)={0x5, [0x10000, 0x3ff], 0x81}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0x9}}, 0x10) 01:24:20 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 2: r0 = socket(0x28, 0x1, 0x3) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@qipcrtr={0x2a, 0x2, 0x1}, {&(0x7f00000000c0)=""/175, 0xaf}, &(0x7f0000000040)}, 0xa0) (async, rerun: 64) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'veth1_macvtap\x00'}) (async, rerun: 64) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000300)={0xb, 0x10, 0xfa00, {0x0, r4, 0x63e}}, 0x18) 01:24:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000280)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x111, 0x1}}, 0x20) 01:24:20 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 01:24:20 executing program 2: r0 = socket(0x28, 0x1, 0x3) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@qipcrtr={0x2a, 0x2, 0x1}, {&(0x7f00000000c0)=""/175, 0xaf}, &(0x7f0000000040)}, 0xa0) (async, rerun: 64) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'veth1_macvtap\x00'}) (rerun: 64) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000300)={0xb, 0x10, 0xfa00, {0x0, r4, 0x63e}}, 0x18) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x200140) (async) socketpair(0x9, 0x5, 0x9, &(0x7f0000000140)) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000001c0)={0x5, [0x10000, 0x3ff], 0x81}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0x9}}, 0x10) 01:24:20 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x111, 0x1}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x111, 0x1}}, 0x20) (async) 01:24:20 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80102) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r3, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0xfffffffd, @mcast1, 0x3}}}, 0x118) 01:24:20 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x97, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:20 executing program 2: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80102) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80102) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r3, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0xfffffffd, @mcast1, 0x3}}}, 0x118) 01:24:20 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x97, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80102) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r3, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0xfffffffd, @mcast1, 0x3}}}, 0x118) 01:24:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:20 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x2b}, 0x100}}}, 0x30) 01:24:20 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r0, 0x0, "00b750", "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"}}, 0x110) 01:24:20 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x97, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:20 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30b2ca2d", @ANYRES16=0x0, @ANYBLOB="000426bd7000fbdbdf2505000000080001002a252b0014000500fe880000000000000000000000000101"], 0x30}, 0x1, 0x0, 0x0, 0x100}, 0x40000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_io_uring_complete(0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x7fffffff, 0x1000, 0xffff, 0x4, r0, 0x80000001, '\x00', 0x0, r0, 0x2, 0x2, 0x1}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/tty/drivers\x00', 0x0, 0x0) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6gre0\x00', 0x0, 0x29, 0x8, 0x8, 0x8, 0x1, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x740, 0x40, 0x401, 0xfffffffb}}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x15, 0x400, 0x2, 0x2, 0x88, r2, 0xfffffffa, '\x00', r8, r7, 0x2, 0x2, 0x1}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x9, 0x8d8, 0x220, r0, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2, 0xa}, 0x48) pipe2$watch_queue(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r12 = syz_io_uring_complete(0x0) r13 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r13, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x18, 0x3f9, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x4040040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="180000080700000000000000ff00000009000000000000000000000000001b5f8806f70700000000000000ba038349976c94d3a7b7a2ef8a4a04704482c716dc8872f7e2c23dd9d7dabe80e0f3f2a6eb3eadaabdf2b10fda9a186ebf0f33e3e692b6a03b5f18ffbe8dba2da024410a4a8161c845e21b83742b4cf9b5b55b739799d636c4383933d52627", @ANYRES32=r1, @ANYBLOB="0000000000000000850000006d00000085000000800000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x10000, 0x12, &(0x7f0000000300)=""/18, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x0, 0x9, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r3, r4, r5, r0, r9, r0, r10, r11, r12, r0], 0x0, 0x10, 0x2}, 0x90) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r14 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r16, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r16, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r16, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r15, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r11, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r15, 0xffffffff}}, 0x10) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x2b}, 0x100}}}, 0x30) 01:24:21 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r0, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30b2ca2d", @ANYRES16=0x0, @ANYBLOB="000426bd7000fbdbdf2505000000080001002a252b0014000500fe880000000000000000000000000101"], 0x30}, 0x1, 0x0, 0x0, 0x100}, 0x40000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80042) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 01:24:21 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x2b}, 0x100}}}, 0x30) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0xfe43) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0x14, 0x70bd2b, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000000) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_io_uring_complete(0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_complete(0x0) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_io_uring_complete(0x0) (async) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x7fffffff, 0x1000, 0xffff, 0x4, r0, 0x80000001, '\x00', 0x0, r0, 0x2, 0x2, 0x1}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x7fffffff, 0x1000, 0xffff, 0x4, r0, 0x80000001, '\x00', 0x0, r0, 0x2, 0x2, 0x1}, 0x48) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/tty/drivers\x00', 0x0, 0x0) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6gre0\x00', 0x0, 0x29, 0x8, 0x8, 0x8, 0x1, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x740, 0x40, 0x401, 0xfffffffb}}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x15, 0x400, 0x2, 0x2, 0x88, r2, 0xfffffffa, '\x00', r8, r7, 0x2, 0x2, 0x1}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x9, 0x8d8, 0x220, r0, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2, 0xa}, 0x48) pipe2$watch_queue(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r12 = syz_io_uring_complete(0x0) r13 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r13, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x18, 0x3f9, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x4040040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="180000080700000000000000ff00000009000000000000000000000000001b5f8806f70700000000000000ba038349976c94d3a7b7a2ef8a4a04704482c716dc8872f7e2c23dd9d7dabe80e0f3f2a6eb3eadaabdf2b10fda9a186ebf0f33e3e692b6a03b5f18ffbe8dba2da024410a4a8161c845e21b83742b4cf9b5b55b739799d636c4383933d52627", @ANYRES32=r1, @ANYBLOB="0000000000000000850000006d00000085000000800000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x10000, 0x12, &(0x7f0000000300)=""/18, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x0, 0x9, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r3, r4, r5, r0, r9, r0, r10, r11, r12, r0], 0x0, 0x10, 0x2}, 0x90) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r14 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r16, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r16, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r16, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r15, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r11, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r15, 0xffffffff}}, 0x10) 01:24:21 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r0, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30b2ca2d", @ANYRES16=0x0, @ANYBLOB="000426bd7000fbdbdf2505000000080001002a252b0014000500fe880000000000000000000000000101"], 0x30}, 0x1, 0x0, 0x0, 0x100}, 0x40000) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="30b2ca2d", @ANYRES16=0x0, @ANYBLOB="000426bd7000fbdbdf2505000000080001002a252b0014000500fe880000000000000000000000000101"], 0x30}, 0x1, 0x0, 0x0, 0x100}, 0x40000) (async) ioctl$LOOP_CLR_FD(r0, 0x4c01) (async) 01:24:21 executing program 3: getgroups(0x2, &(0x7f0000000000)=[0xee01, 0xee01]) syz_open_dev$MSR(&(0x7f00000005c0), 0xfffffffffdfbffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/67, 0x43}, &(0x7f00000000c0), 0x8}, 0x20) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80042) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80042) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0xfe43) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0x14, 0x70bd2b, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000000) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async, rerun: 32) r1 = syz_io_uring_complete(0x0) (async, rerun: 32) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x7fffffff, 0x1000, 0xffff, 0x4, r0, 0x80000001, '\x00', 0x0, r0, 0x2, 0x2, 0x1}, 0x48) (async, rerun: 64) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/tty/drivers\x00', 0x0, 0x0) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6gre0\x00', 0x0, 0x29, 0x8, 0x8, 0x8, 0x1, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x740, 0x40, 0x401, 0xfffffffb}}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x15, 0x400, 0x2, 0x2, 0x88, r2, 0xfffffffa, '\x00', r8, r7, 0x2, 0x2, 0x1}, 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x9, 0x9, 0x8d8, 0x220, r0, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2, 0xa}, 0x48) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) r12 = syz_io_uring_complete(0x0) (async) r13 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r13, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x18, 0x3f9, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x4040040) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="180000080700000000000000ff00000009000000000000000000000000001b5f8806f70700000000000000ba038349976c94d3a7b7a2ef8a4a04704482c716dc8872f7e2c23dd9d7dabe80e0f3f2a6eb3eadaabdf2b10fda9a186ebf0f33e3e692b6a03b5f18ffbe8dba2da024410a4a8161c845e21b83742b4cf9b5b55b739799d636c4383933d52627", @ANYRES32=r1, @ANYBLOB="0000000000000000850000006d00000085000000800000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x10000, 0x12, &(0x7f0000000300)=""/18, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x0, 0x9, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r3, r4, r5, r0, r9, r0, r10, r11, r12, r0], 0x0, 0x10, 0x2}, 0x90) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r14 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r14, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r16, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async, rerun: 64) inotify_add_watch(r16, &(0x7f0000000900)='./file0\x00', 0x80) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r16, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r15, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r11, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r15, 0xffffffff}}, 0x10) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b8, 0x3f0, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@multicast1, 0x2b, 0x24, 0xffff}}}, {{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0xff, 0xff000000, 0xffffff00, 0xff000000], [0xff000000, 0xff000000, 0xffffff00, 0xff], 'sit0\x00', 'pimreg1\x00', {}, {}, 0x33, 0x8b, 0x1, 0x15}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@remote, @ipv4=@multicast2, 0x30, 0x15, 0x6ef}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@empty, 0x2c, 0x32, 0x2}}}, {{@ipv6={@private1, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0x0, 0xff, 0xffffff00], [0xffff00, 0xff, 0x0, 0x7fffff80], 'veth0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x16, 0x0, 0x2, 0x9}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2}}}, {{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [0x0, 0xffffff00, 0xffffff00], [0xffffff00, 0x154287e07803edca, 0xffffff00, 0xffffff00], 'netpci0\x00', 'team_slave_1\x00', {}, {}, 0x67, 0x20, 0x3}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0\x00'}) 01:24:21 executing program 3: getgroups(0x2, &(0x7f0000000000)=[0xee01, 0xee01]) syz_open_dev$MSR(&(0x7f00000005c0), 0xfffffffffdfbffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/67, 0x43}, &(0x7f00000000c0), 0x8}, 0x20) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0xfe43) (async, rerun: 32) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0x14, 0x70bd2b, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'pimreg1\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000000) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 3: getgroups(0x2, &(0x7f0000000000)=[0xee01, 0xee01]) syz_open_dev$MSR(&(0x7f00000005c0), 0xfffffffffdfbffff, 0x0) (async) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/67, 0x43}, &(0x7f00000000c0), 0x8}, 0x20) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000008, 0x4010, r0, 0x1) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x2, 0x315002) ioctl$X86_IOC_RDMSR_REGS(r2, 0xc02063a0, &(0x7f0000000300)=[0x5, 0x2, 0x0, 0x1f, 0x1, 0x5, 0x5, 0x8]) pipe2$watch_queue(&(0x7f0000000280), 0x80) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x4, 0x7f, 0x1f, 0x4, 0x1, 0x2, 0x1, 0x683a7306]) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80042) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80042) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b8, 0x3f0, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@multicast1, 0x2b, 0x24, 0xffff}}}, {{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0xff, 0xff000000, 0xffffff00, 0xff000000], [0xff000000, 0xff000000, 0xffffff00, 0xff], 'sit0\x00', 'pimreg1\x00', {}, {}, 0x33, 0x8b, 0x1, 0x15}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@remote, @ipv4=@multicast2, 0x30, 0x15, 0x6ef}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@empty, 0x2c, 0x32, 0x2}}}, {{@ipv6={@private1, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0x0, 0xff, 0xffffff00], [0xffff00, 0xff, 0x0, 0x7fffff80], 'veth0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x16, 0x0, 0x2, 0x9}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2}}}, {{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [0x0, 0xffffff00, 0xffffff00], [0xffffff00, 0x154287e07803edca, 0xffffff00, 0xffffff00], 'netpci0\x00', 'team_slave_1\x00', {}, {}, 0x67, 0x20, 0x3}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) (async) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0\x00'}) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) read$msr(r0, &(0x7f0000000000)=""/204, 0xcc) connect$l2tp6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x66fa, 0x3}, 0x20) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x6, 0x5, {"e529549a497b9b8595b7ee10e79ace47"}, 0x8, 0x5, 0x40}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r2, 0x27eaaf49}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x501400) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, "732a9a", "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"}}, 0x110) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000008, 0x4010, r0, 0x1) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r2 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x2, 0x315002) ioctl$X86_IOC_RDMSR_REGS(r2, 0xc02063a0, &(0x7f0000000300)=[0x5, 0x2, 0x0, 0x1f, 0x1, 0x5, 0x5, 0x8]) (async) pipe2$watch_queue(&(0x7f0000000280), 0x80) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x4, 0x7f, 0x1f, 0x4, 0x1, 0x2, 0x1, 0x683a7306]) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x6, 0x5, {"e529549a497b9b8595b7ee10e79ace47"}, 0x8, 0x5, 0x40}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r2, 0x27eaaf49}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r0, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) read$msr(r0, &(0x7f0000000000)=""/204, 0xcc) connect$l2tp6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x66fa, 0x3}, 0x20) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x501400) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, "732a9a", "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"}}, 0x110) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000008, 0x4010, r0, 0x1) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_open_dev$vcsu(&(0x7f00000002c0), 0x2, 0x315002) (async) r2 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x2, 0x315002) ioctl$X86_IOC_RDMSR_REGS(r2, 0xc02063a0, &(0x7f0000000300)=[0x5, 0x2, 0x0, 0x1f, 0x1, 0x5, 0x5, 0x8]) pipe2$watch_queue(&(0x7f0000000280), 0x80) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x4, 0x7f, 0x1f, 0x4, 0x1, 0x2, 0x1, 0x683a7306]) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000300)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x6, 0x5, {"e529549a497b9b8595b7ee10e79ace47"}, 0x8, 0x5, 0x40}}}, 0x90) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r2, 0x27eaaf49}}, 0x18) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) (async, rerun: 64) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b8, 0x3f0, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@multicast1, 0x2b, 0x24, 0xffff}}}, {{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [0xff, 0xff000000, 0xffffff00, 0xff000000], [0xff000000, 0xff000000, 0xffffff00, 0xff], 'sit0\x00', 'pimreg1\x00', {}, {}, 0x33, 0x8b, 0x1, 0x15}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@eui64={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@remote, @ipv4=@multicast2, 0x30, 0x15, 0x6ef}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@loopback, @ipv4=@empty, 0x2c, 0x32, 0x2}}}, {{@ipv6={@private1, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0x0, 0xff, 0xffffff00], [0xffff00, 0xff, 0x0, 0x7fffff80], 'veth0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x16, 0x0, 0x2, 0x9}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2}}}, {{@ipv6={@private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [0x0, 0xffffff00, 0xffffff00], [0xffffff00, 0x154287e07803edca, 0xffffff00, 0xffffff00], 'netpci0\x00', 'team_slave_1\x00', {}, {}, 0x67, 0x20, 0x3}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x4}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) (async, rerun: 64) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'veth0\x00'}) 01:24:21 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r0, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) read$msr(r0, &(0x7f0000000000)=""/204, 0xcc) (async) connect$l2tp6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x66fa, 0x3}, 0x20) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x501400) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, "732a9a", "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"}}, 0x110) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x3, 0x501400) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x80, "732a9a", "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"}}, 0x110) (async) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socket(0x10, 0x100a, 0x6) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r0, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) 01:24:21 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/meminfo\x00', 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r0 = getegid() getgroups(0x6, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0, 0xffffffffffffffff]) getgroups(0x8, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, r1, 0xffffffffffffffff, 0xee01]) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r2, &(0x7f0000000080)=""/211, 0xd3) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socket(0x10, 0x100a, 0x6) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x5}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/meminfo\x00', 0x0, 0x0) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) r0 = getegid() getgroups(0x6, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0, 0xffffffffffffffff]) getgroups(0x8, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, r1, 0xffffffffffffffff, 0xee01]) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r2, &(0x7f0000000080)=""/211, 0xd3) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) 01:24:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r4) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, '$)(#}&\x00'}]}, 0x30}}, 0xc800) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0202}}]}, 0x28}}, 0x1) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000000001, 0x0) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socket(0x10, 0x100a, 0x6) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) socket(0x10, 0x100a, 0x6) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socket$phonet_pipe(0x23, 0x5, 0x2) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x200, 0x400000000000, 0x0, 0x100000000, 0x2, 0x5, 0x40, 0x1}, &(0x7f0000000040)={0x80, 0x5e5, 0x2800000000000000, 0x1, 0xfffffffffffffff9, 0x1f, 0x9, 0x6ee}, &(0x7f00000000c0)={0x7fffffffffffffff, 0x7, 0x5, 0x40, 0xa7, 0x3, 0xfffffffffffffffc, 0x33}, &(0x7f0000000140)={r1, r2/1000+10000}) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x5}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x5}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r4) (async) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, '$)(#}&\x00'}]}, 0x30}}, 0xc800) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0202}}]}, 0x28}}, 0x1) (async) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000000001, 0x0) 01:24:21 executing program 0: write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xf4bd}}, 0x10) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/meminfo\x00', 0x0, 0x0) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) r0 = getegid() (async) getgroups(0x6, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0, 0xffffffffffffffff]) getgroups(0x8, &(0x7f0000000280)=[r0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, r1, 0xffffffffffffffff, 0xee01]) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r2, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x5}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 0: write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xf4bd}}, 0x10) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r1) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r4) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, '$)(#}&\x00'}]}, 0x30}}, 0xc800) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0202}}]}, 0x28}}, 0x1) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000000001, 0x0) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socket$phonet_pipe(0x23, 0x5, 0x2) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x200, 0x400000000000, 0x0, 0x100000000, 0x2, 0x5, 0x40, 0x1}, &(0x7f0000000040)={0x80, 0x5e5, 0x2800000000000000, 0x1, 0xfffffffffffffff9, 0x1f, 0x9, 0x6ee}, &(0x7f00000000c0)={0x7fffffffffffffff, 0x7, 0x5, 0x40, 0xa7, 0x3, 0xfffffffffffffffc, 0x33}, &(0x7f0000000140)={r1, r2/1000+10000}) (async) select(0x40, &(0x7f0000000000)={0x200, 0x400000000000, 0x0, 0x100000000, 0x2, 0x5, 0x40, 0x1}, &(0x7f0000000040)={0x80, 0x5e5, 0x2800000000000000, 0x1, 0xfffffffffffffff9, 0x1f, 0x9, 0x6ee}, &(0x7f00000000c0)={0x7fffffffffffffff, 0x7, 0x5, 0x40, 0xa7, 0x3, 0xfffffffffffffffc, 0x33}, &(0x7f0000000140)={r1, r2/1000+10000}) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080)=0x7f, r1, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xb4ce) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 0: write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xf4bd}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xf4bd}}, 0x10) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080)=0x7f, r1, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = socket(0x10, 0x2, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xe8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @remote}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x88}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004040}, 0x40000060) 01:24:21 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xb4ce) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socket$phonet_pipe(0x23, 0x5, 0x2) (async) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x200, 0x400000000000, 0x0, 0x100000000, 0x2, 0x5, 0x40, 0x1}, &(0x7f0000000040)={0x80, 0x5e5, 0x2800000000000000, 0x1, 0xfffffffffffffff9, 0x1f, 0x9, 0x6ee}, &(0x7f00000000c0)={0x7fffffffffffffff, 0x7, 0x5, 0x40, 0xa7, 0x3, 0xfffffffffffffffc, 0x33}, &(0x7f0000000140)={r1, r2/1000+10000}) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = socket(0x10, 0x2, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xe8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @remote}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x88}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004040}, 0x40000060) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080)=0x7f, r1, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000500)={0xfffffff8}, 0x4) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r5, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}]}, 0x3c}}, 0x40000) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x2, {0x29, 0x639e, "4a978aad101b75ab32c3204633b88d9ad83a862ae14bcdb8207d599a04c1f7cd3f26722d2f1dccd81c319d13b8bff3b4358da55edb2b532c36aa8db4780c286f64200b4da0db946688c0763c0de1d89716b755372f28350f857b7f114cde789ddeaeb1613c867cb237ff5fe3fc96b498764a34f9a177a436ab57f4b75a93c22a1e0cc9e73adf73b20c2685c8fe1f12ca5d6cd3c8df53dd6abdf5003fb6765409af4e729f6b70cf5916364d57f32f20be1404bad93904d0bbfe22e9ffc36a40ecfbce0a8eab2d653f9a5241e067376275264d5b69a21103e9211991a25d016647318839b82d806aa70ed8861959e4177559512066b8a11263c22ebcb160fa943f", 0x6, 0x4, 0x5, 0xc1, 0x5, 0x81, 0x6}, r7}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480), 0x111, 0x8}}, 0x20) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a69d5d35723f17eb6921803a52ab7232f5b938c4c091d54bd5f474e4bb3c4447888b80d56aafc23ba70a689e36dd1889cc85788230e9bb07da450a152f64dca76c3612f002ac4245d3bcf78fd0655b71d35b48a5703b0a6e8f3769c805133583b5") write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xb4ce) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_io_uring_complete(0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = socket(0x10, 0x2, 0x0) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xe8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @remote}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x88}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004040}, 0x40000060) 01:24:21 executing program 3: syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000001f00000018420000050000000000000032eaccf2e4f23ad30000000000000000000000001838000005000000000000000000000018420000010000000000000000000000950000000000000018490000ffffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1a, &(0x7f0000000100)=""/26, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) syz_open_dev$MSR(&(0x7f0000000140), 0xff, 0x0) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) syz_io_uring_complete(0x0) (async) r2 = syz_io_uring_complete(0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a69d5d35723f17eb6921803a52ab7232f5b938c4c091d54bd5f474e4bb3c4447888b80d56aafc23ba70a689e36dd1889cc85788230e9bb07da450a152f64dca76c3612f002ac4245d3bcf78fd0655b71d35b48a5703b0a6e8f3769c805133583b5") write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) (async) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a69d5d35723f17eb6921803a52ab7232f5b938c4c091d54bd5f474e4bb3c4447888b80d56aafc23ba70a689e36dd1889cc85788230e9bb07da450a152f64dca76c3612f002ac4245d3bcf78fd0655b71d35b48a5703b0a6e8f3769c805133583b5") (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_io_uring_complete(0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) syz_io_uring_complete(0x0) (async) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:21 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000500)={0xfffffff8}, 0x4) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r5, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}]}, 0x3c}}, 0x40000) (async) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x2, {0x29, 0x639e, "4a978aad101b75ab32c3204633b88d9ad83a862ae14bcdb8207d599a04c1f7cd3f26722d2f1dccd81c319d13b8bff3b4358da55edb2b532c36aa8db4780c286f64200b4da0db946688c0763c0de1d89716b755372f28350f857b7f114cde789ddeaeb1613c867cb237ff5fe3fc96b498764a34f9a177a436ab57f4b75a93c22a1e0cc9e73adf73b20c2685c8fe1f12ca5d6cd3c8df53dd6abdf5003fb6765409af4e729f6b70cf5916364d57f32f20be1404bad93904d0bbfe22e9ffc36a40ecfbce0a8eab2d653f9a5241e067376275264d5b69a21103e9211991a25d016647318839b82d806aa70ed8861959e4177559512066b8a11263c22ebcb160fa943f", 0x6, 0x4, 0x5, 0xc1, 0x5, 0x81, 0x6}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480), 0x111, 0x8}}, 0x20) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = syz_io_uring_complete(0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1195292ba52449b9243138821bbf7ad4f5e2339e420a8c29e808bb1b4a881246e1323bcc516f4055fee22cad7bfc32093b8411dcd0b31ca7f91554ff8be3e5ff9de2f10afcbad20a1e1f832d814e659cf2d1b8d5229a3ed355404c01921484f421d40af14077d900a4399246a4f4b6bad395dbdf08738e383f73d2ae6a950fe2dd255769fb572b19352329c2929385a142ef64eea56ff5b90013212d763e26f67685aa4d7702949083ccc83f8c0cb532ef", @ANYRES16=0x0, @ANYBLOB="2f0026fd7000fbdbdf25010000000c00020004000000000000000c0006000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4040000}, 0x881) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480), 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r3) r7 = inotify_add_watch(r5, &(0x7f0000000500)='./file0\x00', 0x82000090) inotify_rm_watch(r0, r7) r8 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000940)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x2, r4, 0x30, 0x1, @ib={0x1b, 0x3f, 0x2, {"be0db1b5bba2c35a2f9ec16322423abd"}, 0x5, 0x20, 0x5}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x36, @private2, 0x6}, {0xa, 0x4e23, 0x5, @loopback, 0x2}, r4, 0x9}}, 0x48) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000226bd7000fddbdf2505000900000005000100040008001700", @ANYBLOB="c0c79992695a66df617664884f64798116703e85e611a8eda0d8ed9041e34de0a53ba23aa4ab968d601a48635b7621301d7465cf300e0c29a5dee1f6b51ceb71f941d4e4c80a396aa8e96ec61f446ba55401f2b06edd97591d3352c4b04129ba7019c9733a0eccb211af172bc6076f43c1e6955438ab2f3e5e0cd39ebccfc7f8741d4f0a31626d05dcb19059a8c9e46951bf1706684a1ce1dcf1502522c4ea7ab9ae54af62d3adaea8d0c08fd5b4361dbedd37dfcd2382af4898636b4dcad2f8f3de4f0325ea0ef708905c2ea2f3f47ce215fcac0f2725e02b516cfb779725c6455f9a", @ANYBLOB="060002000100000006001a004e22000005000400080000001400200000000000000000000000000000000000050007000200000005000600810000000600030020000000"], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x805) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 3: syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000001f00000018420000050000000000000032eaccf2e4f23ad30000000000000000000000001838000005000000000000000000000018420000010000000000000000000000950000000000000018490000ffffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1a, &(0x7f0000000100)=""/26, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) syz_open_dev$MSR(&(0x7f0000000140), 0xff, 0x0) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:21 executing program 2: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r1, 0x81, "00b750", "90a9df40acde61e4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0bc92181c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c75809334c8060fa696a8a388e583077400"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000400)=0xffff) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r5, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x3f2, 0x1, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x40091) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 01:24:21 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = syz_io_uring_complete(0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1195292ba52449b9243138821bbf7ad4f5e2339e420a8c29e808bb1b4a881246e1323bcc516f4055fee22cad7bfc32093b8411dcd0b31ca7f91554ff8be3e5ff9de2f10afcbad20a1e1f832d814e659cf2d1b8d5229a3ed355404c01921484f421d40af14077d900a4399246a4f4b6bad395dbdf08738e383f73d2ae6a950fe2dd255769fb572b19352329c2929385a142ef64eea56ff5b90013212d763e26f67685aa4d7702949083ccc83f8c0cb532ef", @ANYRES16=0x0, @ANYBLOB="2f0026fd7000fbdbdf25010000000c00020004000000000000000c0006000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4040000}, 0x881) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480), 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r3) r7 = inotify_add_watch(r5, &(0x7f0000000500)='./file0\x00', 0x82000090) inotify_rm_watch(r0, r7) r8 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000940)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x2, r4, 0x30, 0x1, @ib={0x1b, 0x3f, 0x2, {"be0db1b5bba2c35a2f9ec16322423abd"}, 0x5, 0x20, 0x5}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x36, @private2, 0x6}, {0xa, 0x4e23, 0x5, @loopback, 0x2}, r4, 0x9}}, 0x48) (async) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000226bd7000fddbdf2505000900000005000100040008001700", @ANYBLOB="c0c79992695a66df617664884f64798116703e85e611a8eda0d8ed9041e34de0a53ba23aa4ab968d601a48635b7621301d7465cf300e0c29a5dee1f6b51ceb71f941d4e4c80a396aa8e96ec61f446ba55401f2b06edd97591d3352c4b04129ba7019c9733a0eccb211af172bc6076f43c1e6955438ab2f3e5e0cd39ebccfc7f8741d4f0a31626d05dcb19059a8c9e46951bf1706684a1ce1dcf1502522c4ea7ab9ae54af62d3adaea8d0c08fd5b4361dbedd37dfcd2382af4898636b4dcad2f8f3de4f0325ea0ef708905c2ea2f3f47ce215fcac0f2725e02b516cfb779725c6455f9a", @ANYBLOB="060002000100000006001a004e22000005000400080000001400200000000000000000000000000000000000050007000200000005000600810000000600030020000000"], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x805) 01:24:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 2: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r1, 0x81, "00b750", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r1, 0x81, "00b750", "90a9df40acde61e4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0bc92181c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c75809334c8060fa696a8a388e583077400"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000400)=0xffff) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r5, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x3f2, 0x1, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x40091) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 01:24:22 executing program 3: syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000001f00000018420000050000000000000032eaccf2e4f23ad30000000000000000000000001838000005000000000000000000000018420000010000000000000000000000950000000000000018490000ffffffff"], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1a, &(0x7f0000000100)=""/26, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_open_dev$MSR(&(0x7f0000000140), 0xff, 0x0) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async, rerun: 32) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (rerun: 32) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000500)={0xfffffff8}, 0x4) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (rerun: 64) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r5) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r5, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6erspan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}]}, 0x3c}}, 0x40000) (async, rerun: 32) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/key-users\x00', 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x2, {0x29, 0x639e, "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", 0x6, 0x4, 0x5, 0xc1, 0x5, 0x81, 0x6}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480), 0x111, 0x8}}, 0x20) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x48) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (rerun: 64) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = syz_io_uring_complete(0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1195292ba52449b9243138821bbf7ad4f5e2339e420a8c29e808bb1b4a881246e1323bcc516f4055fee22cad7bfc32093b8411dcd0b31ca7f91554ff8be3e5ff9de2f10afcbad20a1e1f832d814e659cf2d1b8d5229a3ed355404c01921484f421d40af14077d900a4399246a4f4b6bad395dbdf08738e383f73d2ae6a950fe2dd255769fb572b19352329c2929385a142ef64eea56ff5b90013212d763e26f67685aa4d7702949083ccc83f8c0cb532ef", @ANYRES16=0x0, @ANYBLOB="2f0026fd7000fbdbdf25010000000c00020004000000000000000c0006000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4040000}, 0x881) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r2 = socket(0x10, 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480), 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r3) r7 = inotify_add_watch(r5, &(0x7f0000000500)='./file0\x00', 0x82000090) inotify_rm_watch(r0, r7) (async) r8 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000940)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x2, r4, 0x30, 0x1, @ib={0x1b, 0x3f, 0x2, {"be0db1b5bba2c35a2f9ec16322423abd"}, 0x5, 0x20, 0x5}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x36, @private2, 0x6}, {0xa, 0x4e23, 0x5, @loopback, 0x2}, r4, 0x9}}, 0x48) (async) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000226bd7000fddbdf2505000900000005000100040008001700", @ANYBLOB="c0c79992695a66df617664884f64798116703e85e611a8eda0d8ed9041e34de0a53ba23aa4ab968d601a48635b7621301d7465cf300e0c29a5dee1f6b51ceb71f941d4e4c80a396aa8e96ec61f446ba55401f2b06edd97591d3352c4b04129ba7019c9733a0eccb211af172bc6076f43c1e6955438ab2f3e5e0cd39ebccfc7f8741d4f0a31626d05dcb19059a8c9e46951bf1706684a1ce1dcf1502522c4ea7ab9ae54af62d3adaea8d0c08fd5b4361dbedd37dfcd2382af4898636b4dcad2f8f3de4f0325ea0ef708905c2ea2f3f47ce215fcac0f2725e02b516cfb779725c6455f9a", @ANYBLOB="060002000100000006001a004e22000005000400080000001400200000000000000000000000000000000000050007000200000005000600810000000600030020000000"], 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x805) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 2: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r1, 0x81, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000400)=0xffff) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$AUDIT_SIGNAL_INFO(r5, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x3f2, 0x1, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x40091) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) pipe2$watch_queue(&(0x7f00000002c0), 0x80) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x3, 0x4, 0x10000000, 0x95, 0x0, 0x3, 0x5, 0x4]) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000280)={'wpan0\x00'}) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 3: r0 = getpgid(0xffffffffffffffff) getpgid(r0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x3e9, 0x100, 0x70bd2c, 0x25dfdbfb, {0x8, 0x1, 0x1, 0x0, 0x5, 0x4453, 0x47a7, 0x9, 0x0, 0x2, 0x10001}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x1, 0xff, 0xff, 0x0, 0x81, 0x2004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x3, 0x73661e31, 0x8, 0x8000000000000001, 0x3eb, 0x1, 0x0, 0xfffffff7, 0x0, 0x100000000000000}, r0, 0x2, 0xffffffffffffffff, 0x1) 01:24:22 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) read$msr(r0, &(0x7f00000000c0)=""/153, 0x99) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4}, 0xc) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 3: getpgid(0xffffffffffffffff) (async) r0 = getpgid(0xffffffffffffffff) getpgid(r0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x3e9, 0x100, 0x70bd2c, 0x25dfdbfb, {0x8, 0x1, 0x1, 0x0, 0x5, 0x4453, 0x47a7, 0x9, 0x0, 0x2, 0x10001}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x1, 0xff, 0xff, 0x0, 0x81, 0x2004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x3, 0x73661e31, 0x8, 0x8000000000000001, 0x3eb, 0x1, 0x0, 0xfffffff7, 0x0, 0x100000000000000}, r0, 0x2, 0xffffffffffffffff, 0x1) 01:24:22 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x9, 0xc0000000, "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", 0x1, 0x2, 0x4, 0x1, 0x8, 0x2, 0x3}}}, 0x120) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f00000002c0), 0x80) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x3, 0x4, 0x10000000, 0x95, 0x0, 0x3, 0x5, 0x4]) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r1) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000280)={'wpan0\x00'}) (rerun: 32) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) read$msr(r0, &(0x7f00000000c0)=""/153, 0x99) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4}, 0xc) 01:24:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$X86_IOC_RDMSR_REGS(r2, 0xc02063a0, &(0x7f0000000140)=[0x2d00c5cd, 0x5, 0x6, 0x80000001, 0x80000000, 0x4, 0x0, 0x800]) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000004390fdf7eb8eb8727fb1ee8446adfce4feca4306b935f3d4c3a2b3cb32bad99b25d48a643c", @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf2508180000080011000000000005000d00018000000600020000000001050022000000000006001b004e210000"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) pipe2$watch_queue(&(0x7f0000000380), 0x80) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffffffff, @empty}, {0xa, 0x0, 0x7, @private1={0xfc, 0x1, '\x00', 0xfd}, 0xffffffff}, r4}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f00000002c0), 0x80) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x3, 0x4, 0x10000000, 0x95, 0x0, 0x3, 0x5, 0x4]) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r1) (async) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000280)={'wpan0\x00'}) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 3: r0 = getpgid(0xffffffffffffffff) getpgid(r0) (async, rerun: 64) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x3e9, 0x100, 0x70bd2c, 0x25dfdbfb, {0x8, 0x1, 0x1, 0x0, 0x5, 0x4453, 0x47a7, 0x9, 0x0, 0x2, 0x10001}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000000) (async, rerun: 64) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1, 0x1, 0xff, 0xff, 0x0, 0x81, 0x2004, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x200, 0x3, 0x73661e31, 0x8, 0x8000000000000001, 0x3eb, 0x1, 0x0, 0xfffffff7, 0x0, 0x100000000000000}, r0, 0x2, 0xffffffffffffffff, 0x1) 01:24:22 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) read$msr(r0, &(0x7f00000000c0)=""/153, 0x99) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000000)={0xa, 0x4}, 0xc) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x9, 0xc0000000, "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", 0x1, 0x2, 0x4, 0x1, 0x8, 0x2, 0x3}}}, 0x120) 01:24:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(r2, 0xc02063a0, &(0x7f0000000140)=[0x2d00c5cd, 0x5, 0x6, 0x80000001, 0x80000000, 0x4, 0x0, 0x800]) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000004390fdf7eb8eb8727fb1ee8446adfce4feca4306b935f3d4c3a2b3cb32bad99b25d48a643c", @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf2508180000080011000000000005000d00018000000600020000000001050022000000000006001b004e210000"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffffffff, @empty}, {0xa, 0x0, 0x7, @private1={0xfc, 0x1, '\x00', 0xfd}, 0xffffffff}, r4}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) 01:24:22 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x9, 0xc0000000, "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", 0x1, 0x2, 0x4, 0x1, 0x8, 0x2, 0x3}}}, 0x120) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f0000000300), 0x2, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r1 = socket(0x1f, 0xa, 0x80000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='btrfs_setup_cluster\x00'}, 0x10) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x10001, 0x80000001, "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", 0x2, 0xc6, 0xff, 0x0, 0xfb, 0x1, 0x1, 0x1}}}, 0x120) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="5f3c7a046cdecd0119b33a8607c5ac44367321a00926a613ccf5c6036cb8e6dc329e6e3dc6e357d3bc24c3711edf93e2d0ef5552fe9160082af9b1f2cb0494d8b6da13916cb062b0632a4d8c4f9e616d3618c43753a02326a561e9c3082d393220cf57af1ec88ea87dd91b32e53358d21cd8e4e1323c8e8e67b1e1282a039bfad0082dd0ddc026fde92da1182afe166c8290a9992376faf9003180a9d7d1e4ac92f3be30c476b6f072") 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc4c, 0x0, 0x0, 0x0, 0x4}, [@exit, @exit, @exit, @call={0x85, 0x0, 0x0, 0x51}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x1, 0x0, 0x2, 0x5, 0x0, 0x18, 0x10}]}, &(0x7f00000000c0)='syzkaller\x00', 0xffff, 0x26, &(0x7f0000000100)=""/38, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0x1, 0x8}, 0x10, 0x13ef3, 0xffffffffffffffff, 0x6, &(0x7f0000000200)=[r1, r0], &(0x7f0000000240)=[{0x5, 0x5, 0x0, 0x5}, {0x0, 0x1, 0x0, 0xb}, {0x1, 0x5, 0x10, 0xc}, {0x2, 0x2, 0x8, 0x3}, {0x3, 0x2, 0x8, 0x5}, {0x3, 0x4, 0xe}], 0x10, 0x945}, 0x90) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0xb0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r0, r1, 0x0, r2}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc4c, 0x0, 0x0, 0x0, 0x4}, [@exit, @exit, @exit, @call={0x85, 0x0, 0x0, 0x51}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x1, 0x0, 0x2, 0x5, 0x0, 0x18, 0x10}]}, &(0x7f00000000c0)='syzkaller\x00', 0xffff, 0x26, &(0x7f0000000100)=""/38, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0x1, 0x8}, 0x10, 0x13ef3, 0xffffffffffffffff, 0x6, &(0x7f0000000200)=[r1, r0], &(0x7f0000000240)=[{0x5, 0x5, 0x0, 0x5}, {0x0, 0x1, 0x0, 0xb}, {0x1, 0x5, 0x10, 0xc}, {0x2, 0x2, 0x8, 0x3}, {0x3, 0x2, 0x8, 0x5}, {0x3, 0x4, 0xe}], 0x10, 0x945}, 0x90) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async, rerun: 32) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) (async, rerun: 32) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0xb0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r0, r1, 0x0, r2}, 0x10) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(r2, 0xc02063a0, &(0x7f0000000140)=[0x2d00c5cd, 0x5, 0x6, 0x80000001, 0x80000000, 0x4, 0x0, 0x800]) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000004390fdf7eb8eb8727fb1ee8446adfce4feca4306b935f3d4c3a2b3cb32bad99b25d48a643c", @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf2508180000080011000000000005000d00018000000600020000000001050022000000000006001b004e210000"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffffffff, @empty}, {0xa, 0x0, 0x7, @private1={0xfc, 0x1, '\x00', 0xfd}, 0xffffffff}, r4}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) 01:24:22 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f7, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r1, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f0000000300), 0x2, 0x0) (async) r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) (async) r1 = socket(0x1f, 0xa, 0x80000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='btrfs_setup_cluster\x00'}, 0x10) (async) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x10001, 0x80000001, "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", 0x2, 0xc6, 0xff, 0x0, 0xfb, 0x1, 0x1, 0x1}}}, 0x120) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="5f3c7a046cdecd0119b33a8607c5ac44367321a00926a613ccf5c6036cb8e6dc329e6e3dc6e357d3bc24c3711edf93e2d0ef5552fe9160082af9b1f2cb0494d8b6da13916cb062b0632a4d8c4f9e616d3618c43753a02326a561e9c3082d393220cf57af1ec88ea87dd91b32e53358d21cd8e4e1323c8e8e67b1e1282a039bfad0082dd0ddc026fde92da1182afe166c8290a9992376faf9003180a9d7d1e4ac92f3be30c476b6f072") 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc4c, 0x0, 0x0, 0x0, 0x4}, [@exit, @exit, @exit, @call={0x85, 0x0, 0x0, 0x51}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x1, 0x0, 0x2, 0x5, 0x0, 0x18, 0x10}]}, &(0x7f00000000c0)='syzkaller\x00', 0xffff, 0x26, &(0x7f0000000100)=""/38, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0x1, 0x8}, 0x10, 0x13ef3, 0xffffffffffffffff, 0x6, &(0x7f0000000200)=[r1, r0], &(0x7f0000000240)=[{0x5, 0x5, 0x0, 0x5}, {0x0, 0x1, 0x0, 0xb}, {0x1, 0x5, 0x10, 0xc}, {0x2, 0x2, 0x8, 0x3}, {0x3, 0x2, 0x8, 0x5}, {0x3, 0x4, 0xe}], 0x10, 0x945}, 0x90) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc4c, 0x0, 0x0, 0x0, 0x4}, [@exit, @exit, @exit, @call={0x85, 0x0, 0x0, 0x51}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x1, 0x0, 0x2, 0x5, 0x0, 0x18, 0x10}]}, &(0x7f00000000c0)='syzkaller\x00', 0xffff, 0x26, &(0x7f0000000100)=""/38, 0x41100, 0x4, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0x1, 0x8}, 0x10, 0x13ef3, 0xffffffffffffffff, 0x6, &(0x7f0000000200)=[r1, r0], &(0x7f0000000240)=[{0x5, 0x5, 0x0, 0x5}, {0x0, 0x1, 0x0, 0xb}, {0x1, 0x5, 0x10, 0xc}, {0x2, 0x2, 0x8, 0x3}, {0x3, 0x2, 0x8, 0x5}, {0x3, 0x4, 0xe}], 0x10, 0x945}, 0x90) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:22 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f7, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85f7, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x3}}, 0x18) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, 0x0, 0x0) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x3}}, 0x18) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f0000000300), 0x2, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r1 = socket(0x1f, 0xa, 0x80000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='btrfs_setup_cluster\x00'}, 0x10) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x10001, 0x80000001, "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", 0x2, 0xc6, 0xff, 0x0, 0xfb, 0x1, 0x1, 0x1}}}, 0x120) (async) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="5f3c7a046cdecd0119b33a8607c5ac44367321a00926a613ccf5c6036cb8e6dc329e6e3dc6e357d3bc24c3711edf93e2d0ef5552fe9160082af9b1f2cb0494d8b6da13916cb062b0632a4d8c4f9e616d3618c43753a02326a561e9c3082d393220cf57af1ec88ea87dd91b32e53358d21cd8e4e1323c8e8e67b1e1282a039bfad0082dd0ddc026fde92da1182afe166c8290a9992376faf9003180a9d7d1e4ac92f3be30c476b6f072") 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0xb0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r0, r1, 0x0, r2}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x80, 0x5, "0cf541f4c24c7950b4f097202eca32fb4a1d4cac92f23f3d0cf1009f6c687c23102fdb12bad22e1a020124d559e21218df72d6040f01b294c91328412d964497f7c4436c14209fcfc5ed39e4e360b8bfd32217e85cf377c445ecc88bcc970ae5eb57b72f2fc4638953f26fce69c20412d8998e9f204ed85bacfdb92465a980098580d2d7230d9cceb0a157d865427027a8ee48e288fa9a07b3359de04255e494a19529925add95cb6e504afc65b9d1d1f3ad0430f22f678a42c18ca6d6874889a8a681d81e2103a39a69633b6a429e12054d46541f4f8ec7c171a7286ac701db5ce6be824ac81ab0b131de8deb5229aa12bde2a3d54f5d0fe53fa8469a40b73f", 0x2, 0x1, 0x7f, 0x9, 0x20, 0x1, 0x20}}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f7, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x3}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x3}}, 0x18) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x80, r1, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x95}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_virt_wifi\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7f}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x81}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x8001}, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x80, 0x5, "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", 0x2, 0x1, 0x7f, 0x9, 0x20, 0x1, 0x20}}}, 0x128) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, 0x0, 0x0) 01:24:22 executing program 2: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/dev/vcsu#\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x85fb, 0x80602) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x20}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, r1, 0x5}, 0x10) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x80, 0x5, "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", 0x2, 0x1, 0x7f, 0x9, 0x20, 0x1, 0x20}}}, 0x128) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x80, 0x5, "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", 0x2, 0x1, 0x7f, 0x9, 0x20, 0x1, 0x20}}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x80, r1, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x95}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_virt_wifi\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7f}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x81}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x8001}, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 2: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/dev/vcsu#\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/dev/vcsu#\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x85fb, 0x80602) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x20}}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x1, 0x80000001, "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", 0x7, 0x80, 0x7, 0x2, 0x1, 0x3f, 0x3f}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x10, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, r1}}, 0x30) getegid() 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @private=0xa010101}, @ib={0x1b, 0x1000, 0x5, {"6b40dc89656dfc76f7aa1f0e9bbc7efa"}, 0x6, 0x1, 0x6}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x6, 0x7, "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", 0x3f, 0x20, 0x4, 0x1, 0x52, 0x0, 0x8, 0x1}, r2}}, 0x128) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, 0x0, 0x0) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x80, r1, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x95}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_virt_wifi\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7f}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x81}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x8001}, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, r1, 0x5}, 0x10) 01:24:22 executing program 2: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='/dev/vcsu#\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x85fb, 0x80602) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x20}}, 0x18) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/ldiscs\x00', 0x0, 0x0) (async) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x1, 0x80000001, "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", 0x7, 0x80, 0x7, 0x2, 0x1, 0x3f, 0x3f}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x10, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, r1}}, 0x30) (async) getegid() 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, r1, 0x5}, 0x10) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @private=0xa010101}, @ib={0x1b, 0x1000, 0x5, {"6b40dc89656dfc76f7aa1f0e9bbc7efa"}, 0x6, 0x1, 0x6}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x6, 0x7, "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", 0x3f, 0x20, 0x4, 0x1, 0x52, 0x0, 0x8, 0x1}, r2}}, 0x128) 01:24:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 2: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e21, 0x80, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}}}, 0x38) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="01272027e0000000000000921bcde9a35744f564215e9f541ca1a1f098d2ffff00000000000079eb6f2339"], 0x2b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socketpair(0xf, 0x800, 0x101, &(0x7f0000000100)={0xffffffffffffffff}) bind$rds(r2, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @private=0xa010101}, @ib={0x1b, 0x1000, 0x5, {"6b40dc89656dfc76f7aa1f0e9bbc7efa"}, 0x6, 0x1, 0x6}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x6, 0x7, "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", 0x3f, 0x20, 0x4, 0x1, 0x52, 0x0, 0x8, 0x1}, r2}}, 0x128) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x81, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @private=0xa010101}, @ib={0x1b, 0x1000, 0x5, {"6b40dc89656dfc76f7aa1f0e9bbc7efa"}, 0x6, 0x1, 0x6}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x6, 0x7, "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", 0x3f, 0x20, 0x4, 0x1, 0x52, 0x0, 0x8, 0x1}, r2}}, 0x128) (async) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x1, 0x80000001, "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", 0x7, 0x80, 0x7, 0x2, 0x1, 0x3f, 0x3f}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x10, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, r1}}, 0x30) (async) getegid() 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 01:24:22 executing program 2: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e21, 0x80, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}}}, 0x38) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="01272027e0000000000000921bcde9a35744f564215e9f541ca1a1f098d2ffff00000000000079eb6f2339"], 0x2b) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) socketpair(0xf, 0x800, 0x101, &(0x7f0000000100)={0xffffffffffffffff}) bind$rds(r2, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @private2, 0x7}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'pim6reg1\x00'}) r1 = syz_io_uring_complete(0x0) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) write$bt_hci(r2, &(0x7f0000000040)={0x1, @le_set_event_mask={{0x2001, 0x8}, {"fb3d1c8d19aefb27"}}}, 0xc) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) inotify_rm_watch(r1, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f0000000040), 0xffffffffffffffff, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0xffffffffffffffff, 0x0) (async) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'pim6reg1\x00'}) r1 = syz_io_uring_complete(0x0) (async) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) write$bt_hci(r2, &(0x7f0000000040)={0x1, @le_set_event_mask={{0x2001, 0x8}, {"fb3d1c8d19aefb27"}}}, 0xc) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) inotify_rm_watch(r1, 0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @private2, 0x7}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @private2, 0x7}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:22 executing program 2: write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e21, 0x80, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}}}, 0x38) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="01272027e0000000000000921bcde9a35744f564215e9f541ca1a1f098d2ffff00000000000079eb6f2339"], 0x2b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socketpair(0xf, 0x800, 0x101, &(0x7f0000000100)) (async) socketpair(0xf, 0x800, 0x101, &(0x7f0000000100)={0xffffffffffffffff}) bind$rds(r2, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) 01:24:22 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/207, 0xcf) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'macvlan0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) r8 = socket(0x15, 0x4, 0x0) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r9, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x4, "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", 0x5, 0x61, 0x7, 0x4b, 0x80, 0x5, 0x3f}}}, 0x128) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 01:24:22 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'pim6reg1\x00'}) (async, rerun: 32) r1 = syz_io_uring_complete(0x0) (async, rerun: 32) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) (async) write$bt_hci(r2, &(0x7f0000000040)={0x1, @le_set_event_mask={{0x2001, 0x8}, {"fb3d1c8d19aefb27"}}}, 0xc) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) inotify_rm_watch(r1, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @private2, 0x7}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) 01:24:22 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x4, "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", 0x5, 0x61, 0x7, 0x4b, 0x80, 0x5, 0x3f}}}, 0x128) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000640)={0xb, 0x10, 0xfa00, {&(0x7f0000000500), r0, 0xfffffffa}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x93, &(0x7f00000001c0)=""/147, 0x40f00, 0x2, '\x00', r3, 0x25, r5, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xd, 0xe7c, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r6], 0x0, 0x10, 0x7}, 0x90) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/cpuinfo\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r7, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000700)=[0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x325, 0x10000, 0x1, 0x1808, r8, 0x8000, '\x00', r9, r4, 0x2, 0x1, 0x5, 0x8}, 0x48) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x400000}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e24, 0x8000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, r3}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:22 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000640)={0xb, 0x10, 0xfa00, {&(0x7f0000000500), r0, 0xfffffffa}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x93, &(0x7f00000001c0)=""/147, 0x40f00, 0x2, '\x00', r3, 0x25, r5, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xd, 0xe7c, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r6], 0x0, 0x10, 0x7}, 0x90) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/cpuinfo\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r7, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000700)=[0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x325, 0x10000, 0x1, 0x1808, r8, 0x8000, '\x00', r9, r4, 0x2, 0x1, 0x5, 0x8}, 0x48) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480), 0x111, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000640)={0xb, 0x10, 0xfa00, {&(0x7f0000000500), r0, 0xfffffffa}}, 0x18) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x93, &(0x7f00000001c0)=""/147, 0x40f00, 0x2, '\x00', r3, 0x25, r5, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xd, 0xe7c, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r6], 0x0, 0x10, 0x7}, 0x90) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/cpuinfo\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r7, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000700)=[0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x325, 0x10000, 0x1, 0x1808, r8, 0x8000, '\x00', r9, r4, 0x2, 0x1, 0x5, 0x8}, 0x48) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:22 executing program 0: setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) epoll_create1(0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x4, "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", 0x5, 0x61, 0x7, 0x4b, 0x80, 0x5, 0x3f}}}, 0x128) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) (async) 01:24:22 executing program 0: setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) epoll_create1(0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0xff, 0x3, 0x28, 0x0, 0x0, 0x8, 0x8, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x2, 0x9a, 0x80, 0x2, 0xfffffffffffffffb, 0x3f50d737, 0x200, 0x0, 0x10001, 0x0, 0x90}, r0, 0x0, r0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:22 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x400000}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e24, 0x8000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, r3}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x400000}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e24, 0x8000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, r3}}, 0x38) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:22 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000640)={0xb, 0x10, 0xfa00, {&(0x7f0000000500), r0, 0xfffffffa}}, 0x18) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x9, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x93, &(0x7f00000001c0)=""/147, 0x40f00, 0x2, '\x00', r3, 0x25, r5, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0xd, 0xe7c, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[r6], 0x0, 0x10, 0x7}, 0x90) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/cpuinfo\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r7, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000700)=[0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x325, 0x10000, 0x1, 0x1808, r8, 0x8000, '\x00', r9, r4, 0x2, 0x1, 0x5, 0x8}, 0x48) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:22 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 01:24:22 executing program 0: setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) epoll_create1(0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) epoll_create1(0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x400000}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e24, 0x8000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, r3}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0xff, 0x3, 0x28, 0x0, 0x0, 0x8, 0x8, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x2, 0x9a, 0x80, 0x2, 0xfffffffffffffffb, 0x3f50d737, 0x200, 0x0, 0x10001, 0x0, 0x90}, r0, 0x0, r0, 0x0) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x800085ff, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 01:24:23 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x100000000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0xff, 0x3, 0x28, 0x0, 0x0, 0x8, 0x8, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp, 0x2, 0x9a, 0x80, 0x2, 0xfffffffffffffffb, 0x3f50d737, 0x200, 0x0, 0x10001, 0x0, 0x90}, r0, 0x0, r0, 0x0) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x800085ff, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) (async) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 01:24:23 executing program 2: r0 = socket(0x10, 0x2, 0x0) r1 = syz_io_uring_complete(0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000001c0), 0x4) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f0000000200)=""/92, 0x5c}, &(0x7f0000000280), 0x33}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000359846e83a8ce2e9f84f1dc54cecdd1cf7904c40a22831004be028edb43b108ccecac18fe553191397ac689f230939069dae98f73024d208a79818598d96e994ff083ad6d29160a03789bb70df981fa1a028e4b560aef7eb50487464b74b370a4243464725dd1e333f82ca3b4ec36764a132c3278c381d5b785e7312f2acc55ddc99", @ANYRES16=r2, @ANYBLOB="0004000000000000000003000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002dbd7000ffdbdfa50300000014001f00ff010000ffffffffffffffff0000000000000000000800110000000000f971491f0eb04c67750b6b54daafb73c6d44625685b3bdff5e693571547cdc5ed621c5c34a891fdb0156c7fe97270e8881ea237d85a558c037a9d28edac46cbb8d51dcd1aa69f7ca893c20be12868f80cdca2a1a2e64225a96444f3d44d8c68c382f167f2b03e61b7df3ad580e4fbec561fff281d2dd53209a27f1b9aae8071817a8e145bd993dd30db48da1ac9a86d9b5e67efa00e61170b2698c3b598421a6417703b5658a471800000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4811}, 0x40c0) connect$l2tp6(r0, &(0x7f0000000380)={0xa, 0x0, 0xa0d, @empty, 0x3f, 0x4}, 0x20) pipe2$watch_queue(&(0x7f00000003c0), 0x80) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x100000000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x800085ff, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) 01:24:23 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) 01:24:23 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x101003) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x100000000000000, &(0x7f00000000c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x100000000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) [ 1519.746066][T13848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=38965 sclass=netlink_route_socket pid=13848 comm=syz-executor.2 01:24:23 executing program 2: r0 = socket(0x10, 0x2, 0x0) (async) r1 = syz_io_uring_complete(0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000001c0), 0x4) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f0000000200)=""/92, 0x5c}, &(0x7f0000000280), 0x33}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000359846e83a8ce2e9f84f1dc54cecdd1cf7904c40a22831004be028edb43b108ccecac18fe553191397ac689f230939069dae98f73024d208a79818598d96e994ff083ad6d29160a03789bb70df981fa1a028e4b560aef7eb50487464b74b370a4243464725dd1e333f82ca3b4ec36764a132c3278c381d5b785e7312f2acc55ddc99", @ANYRES16=r2, @ANYBLOB="0004000000000000000003000000"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002dbd7000ffdbdfa50300000014001f00ff010000ffffffffffffffff0000000000000000000800110000000000f971491f0eb04c67750b6b54daafb73c6d44625685b3bdff5e693571547cdc5ed621c5c34a891fdb0156c7fe97270e8881ea237d85a558c037a9d28edac46cbb8d51dcd1aa69f7ca893c20be12868f80cdca2a1a2e64225a96444f3d44d8c68c382f167f2b03e61b7df3ad580e4fbec561fff281d2dd53209a27f1b9aae8071817a8e145bd993dd30db48da1ac9a86d9b5e67efa00e61170b2698c3b598421a6417703b5658a471800000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4811}, 0x40c0) connect$l2tp6(r0, &(0x7f0000000380)={0xa, 0x0, 0xa0d, @empty, 0x3f, 0x4}, 0x20) (async) pipe2$watch_queue(&(0x7f00000003c0), 0x80) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x5, 0x7, 0x8, 0x81, 0x0, 0x2, 0x8000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, @perf_config_ext={0xff, 0xffffffffffffffff}, 0x80002, 0x8000, 0x8001, 0x3, 0x200, 0x5, 0x4, 0x0, 0x10001, 0x0, 0x81}) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) r1 = getegid() getgroups(0x7, &(0x7f0000000040)=[r0, 0xee00, 0xffffffffffffffff, r1, 0xee01, 0xee01, 0xffffffffffffffff]) getgroups(0x9, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, r3, r4, r3, 0xee00, r0, r2, r1]) setgid(r5) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x5, 0x7, 0x8, 0x81, 0x0, 0x2, 0x8000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, @perf_config_ext={0xff, 0xffffffffffffffff}, 0x80002, 0x8000, 0x8001, 0x3, 0x200, 0x5, 0x4, 0x0, 0x10001, 0x0, 0x81}) (async) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) r1 = getegid() getgroups(0x7, &(0x7f0000000040)=[r0, 0xee00, 0xffffffffffffffff, r1, 0xee01, 0xee01, 0xffffffffffffffff]) getgroups(0x9, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, r3, r4, r3, 0xee00, r0, r2, r1]) setgid(r5) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/200, 0xc8) 01:24:23 executing program 2: r0 = socket(0x10, 0x2, 0x0) r1 = syz_io_uring_complete(0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000001c0), 0x4) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f0000000200)=""/92, 0x5c}, &(0x7f0000000280), 0x33}, 0x20) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000359846e83a8ce2e9f84f1dc54cecdd1cf7904c40a22831004be028edb43b108ccecac18fe553191397ac689f230939069dae98f73024d208a79818598d96e994ff083ad6d29160a03789bb70df981fa1a028e4b560aef7eb50487464b74b370a4243464725dd1e333f82ca3b4ec36764a132c3278c381d5b785e7312f2acc55ddc99", @ANYRES16=r2, @ANYBLOB="0004000000000000000003000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002dbd7000ffdbdfa50300000014001f00ff010000ffffffffffffffff0000000000000000000800110000000000f971491f0eb04c67750b6b54daafb73c6d44625685b3bdff5e693571547cdc5ed621c5c34a891fdb0156c7fe97270e8881ea237d85a558c037a9d28edac46cbb8d51dcd1aa69f7ca893c20be12868f80cdca2a1a2e64225a96444f3d44d8c68c382f167f2b03e61b7df3ad580e4fbec561fff281d2dd53209a27f1b9aae8071817a8e145bd993dd30db48da1ac9a86d9b5e67efa00e61170b2698c3b598421a6417703b5658a471800000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4811}, 0x40c0) connect$l2tp6(r0, &(0x7f0000000380)={0xa, 0x0, 0xa0d, @empty, 0x3f, 0x4}, 0x20) pipe2$watch_queue(&(0x7f00000003c0), 0x80) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) socket(0x10, 0x2, 0x0) (async) syz_io_uring_complete(0x0) (async) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000001c0), 0x4) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f0000000200)=""/92, 0x5c}, &(0x7f0000000280), 0x33}, 0x20) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000359846e83a8ce2e9f84f1dc54cecdd1cf7904c40a22831004be028edb43b108ccecac18fe553191397ac689f230939069dae98f73024d208a79818598d96e994ff083ad6d29160a03789bb70df981fa1a028e4b560aef7eb50487464b74b370a4243464725dd1e333f82ca3b4ec36764a132c3278c381d5b785e7312f2acc55ddc99", @ANYRES16=r2, @ANYBLOB="0004000000000000000003000000"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002dbd7000ffdbdfa50300000014001f00ff010000ffffffffffffffff0000000000000000000800110000000000f971491f0eb04c67750b6b54daafb73c6d44625685b3bdff5e693571547cdc5ed621c5c34a891fdb0156c7fe97270e8881ea237d85a558c037a9d28edac46cbb8d51dcd1aa69f7ca893c20be12868f80cdca2a1a2e64225a96444f3d44d8c68c382f167f2b03e61b7df3ad580e4fbec561fff281d2dd53209a27f1b9aae8071817a8e145bd993dd30db48da1ac9a86d9b5e67efa00e61170b2698c3b598421a6417703b5658a471800000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4811}, 0x40c0) (async) connect$l2tp6(r0, &(0x7f0000000380)={0xa, 0x0, 0xa0d, @empty, 0x3f, 0x4}, 0x20) (async) pipe2$watch_queue(&(0x7f00000003c0), 0x80) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:23 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffff61) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/200, 0xc8) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x5, 0x7, 0x8, 0x81, 0x0, 0x2, 0x8000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, @perf_config_ext={0xff, 0xffffffffffffffff}, 0x80002, 0x8000, 0x8001, 0x3, 0x200, 0x5, 0x4, 0x0, 0x10001, 0x0, 0x81}) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) (async) r1 = getegid() getgroups(0x7, &(0x7f0000000040)=[r0, 0xee00, 0xffffffffffffffff, r1, 0xee01, 0xee01, 0xffffffffffffffff]) getgroups(0x9, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, r3, r4, r3, 0xee00, r0, r2, r1]) setgid(r5) 01:24:23 executing program 5: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x2904702d31ef79b) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x3, 0x0) 01:24:23 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='net_dev_xmit_timeout\x00'}, 0x10) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/200, 0xc8) [ 1519.918867][T13894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=38965 sclass=netlink_route_socket pid=13894 comm=syz-executor.2 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x13f, 0x9}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x9, 0x800, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7fff}, {0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0xad7}, r3, 0x7fff}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x100, "9cf4b3ae33df478da1de80e4f0667812ef45760d8a4cfc08bc29740be3043b298c831223e4654b3612aaf6b9bc6e969170a36791e99bb7e60ad2d81c4cc37f6b1fe8f5ce855dbe63160ea7f42af23bb13da77b3f3198888dc4ac430ef4b8922a1676fa64434d14398d8bbc8dc7444f3671ce074ba024cf46cac12712646f0c90c756eaca5a34ea09dba3d2c23e65db565298fb360c0d6b13628ee39166ab7e6c496d87ba95a35769123cecc7a6c6886b506229453e488c3b251ae927aea5d5fadafe627503592b3c4c5703d5c4f5b6c08876d4bbf644cbc86b069e9a9ab6d0d2dada71062c42ed0c5f41c64c3da2bd0f9dc95209c5335a88f75ae0298dbd46ff", 0x28, 0x2f, 0x3f, 0x8, 0x1, 0x3, 0x20, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r5}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r5}}, 0x30) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x3, 0x0) 01:24:23 executing program 2: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xa5e2}, @jmp={0x5, 0x0, 0xc, 0xa, 0x4, 0x10, 0xfffffffffffffff0}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x8fa0, 0x1000, &(0x7f0000000a40)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000140)=[r2, r2], &(0x7f0000000240)=[{0x3, 0x4, 0xd, 0x7}, {0x0, 0x3, 0xe, 0xb}, {0x1, 0x1, 0x7, 0xc}, {0x2, 0x5, 0x7, 0x5}, {0x3, 0x2, 0xc, 0xb}, {0x2, 0x3, 0x7, 0x5}], 0x10, 0xd0e}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 01:24:23 executing program 5: syz_open_dev$vcsu(0x0, 0x85fb, 0x2904702d31ef79b) 01:24:23 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='net_dev_xmit_timeout\x00'}, 0x10) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x3, 0x0) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x13f, 0x9}}, 0x20) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x9, 0x800, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7fff}, {0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0xad7}, r3, 0x7fff}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x100, "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", 0x28, 0x2f, 0x3f, 0x8, 0x1, 0x3, 0x20, 0x1}, r3}}, 0x120) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r5}}, 0x48) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r5}}, 0x30) (rerun: 64) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 5: syz_open_dev$vcsu(0x0, 0x85fb, 0x2904702d31ef79b) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x80, 0x0) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='net_dev_xmit_timeout\x00'}, 0x10) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 2: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xa5e2}, @jmp={0x5, 0x0, 0xc, 0xa, 0x4, 0x10, 0xfffffffffffffff0}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x8fa0, 0x1000, &(0x7f0000000a40)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000140)=[r2, r2], &(0x7f0000000240)=[{0x3, 0x4, 0xd, 0x7}, {0x0, 0x3, 0xe, 0xb}, {0x1, 0x1, 0x7, 0xc}, {0x2, 0x5, 0x7, 0x5}, {0x3, 0x2, 0xc, 0xb}, {0x2, 0x3, 0x7, 0x5}], 0x10, 0xd0e}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x80, 0x0) syz_open_dev$MSR(&(0x7f0000000000), 0x80, 0x0) (async) 01:24:23 executing program 5: syz_open_dev$vcsu(0x0, 0x85fb, 0x2904702d31ef79b) 01:24:23 executing program 2: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xa5e2}, @jmp={0x5, 0x0, 0xc, 0xa, 0x4, 0x10, 0xfffffffffffffff0}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x8fa0, 0x1000, &(0x7f0000000a40)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000140)=[r2, r2], &(0x7f0000000240)=[{0x3, 0x4, 0xd, 0x7}, {0x0, 0x3, 0xe, 0xb}, {0x1, 0x1, 0x7, 0xc}, {0x2, 0x5, 0x7, 0x5}, {0x3, 0x2, 0xc, 0xb}, {0x2, 0x3, 0x7, 0x5}], 0x10, 0xd0e}, 0x90) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xa5e2}, @jmp={0x5, 0x0, 0xc, 0xa, 0x4, 0x10, 0xfffffffffffffff0}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x8fa0, 0x1000, &(0x7f0000000a40)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x3, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000140)=[r2, r2], &(0x7f0000000240)=[{0x3, 0x4, 0xd, 0x7}, {0x0, 0x3, 0xe, 0xb}, {0x1, 0x1, 0x7, 0xc}, {0x2, 0x5, 0x7, 0x5}, {0x3, 0x2, 0xc, 0xb}, {0x2, 0x3, 0x7, 0x5}], 0x10, 0xd0e}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x421bc0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x56, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x5}}, 0xffffffffffffffc7) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) r4 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r4) r5 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r5) socketpair(0x21, 0x5, 0xde, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$l2tp6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2, 0x7}}, 0x18) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x13f, 0x9}}, 0x20) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x9, 0x800, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7fff}, {0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0xad7}, r3, 0x7fff}}, 0x48) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x100, "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", 0x28, 0x2f, 0x3f, 0x8, 0x1, 0x3, 0x20, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r5}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r5}}, 0x30) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x80, 0x0) 01:24:23 executing program 5: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x2904702d31ef79b) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x421bc0) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x56, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x5}}, 0xffffffffffffffc7) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) r4 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r4) r5 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r5) (async) socketpair(0x21, 0x5, 0xde, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$l2tp6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x20) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2, 0x7}}, 0x18) 01:24:23 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x268, 0x140, 0x338, 0x140, 0x458, 0x578, 0x578, 0x578, 0x578, 0x578, 0x6, &(0x7f0000000240), {[{{@ipv6={@mcast2, @mcast2, [0xffffff00, 0x6cf43ea416100009, 0xff000000, 0xff000000], [0xffffffff, 0xff, 0xffffff00], 'wg2\x00', 'veth0\x00', {}, {}, 0x2c, 0x7f, 0x2, 0x10}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xd}}, @inet=@rpfilter={{0x28}, {0x11}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv6=@empty, 0xf, 0x2a, 0xffc1}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30}, {0x33, 0x4, 0x7, 0x80, 0xffff, 0x21976205b2c8c05c, 0x1000}}, @inet=@rpfilter={{0x28}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, [0xff, 0xffffff00, 0xffffff00, 0xff000000], [0xffffffff, 0xff, 0xffffffff, 0xff000000], 'team_slave_1\x00', 'pim6reg0\x00', {0xff}, {0xff}, 0xd, 0x7, 0x1, 0x44}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0x17}, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0x0, 0xffff00, 0xffffffff], [0x0, 0xff, 0x0, 0xffffffff], 'rose0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x3c, 0x7f, 0x3, 0xc}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}, @common=@mh={{0x28}, {"5b18", 0x1}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xb78b}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x9}}, @inet=@rpfilter={{0x28}, {0x1}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x2}, {0xffffffffffffffff, 0x6, 0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r2, 0x30, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r1, 0x8, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x401, {"05fa6b179437fb0c8c26adfef711c3c0"}, 0x5, 0x1, 0x22}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x118) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r3) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x88}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1b}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20000000) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000004c0)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) read$msr(r3, &(0x7f0000000080)=""/211, 0xd3) read$msr(r3, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x2) r7 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_FD(r7, 0x4c00, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x7, @empty, 0x6}, r8}}, 0x30) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x421bc0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x56, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x5}}, 0xffffffffffffffc7) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (rerun: 64) r4 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r4) (async, rerun: 32) r5 = socket(0x29, 0x2, 0x400) (rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r5) socketpair(0x21, 0x5, 0xde, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$l2tp6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2, 0x7}}, 0x18) (rerun: 64) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r1, 0x8, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x401, {"05fa6b179437fb0c8c26adfef711c3c0"}, 0x5, 0x1, 0x22}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x118) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r3) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x88}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1b}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20000000) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000004c0)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) (async) read$msr(r3, &(0x7f0000000080)=""/211, 0xd3) read$msr(r3, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x268, 0x140, 0x338, 0x140, 0x458, 0x578, 0x578, 0x578, 0x578, 0x578, 0x6, &(0x7f0000000240), {[{{@ipv6={@mcast2, @mcast2, [0xffffff00, 0x6cf43ea416100009, 0xff000000, 0xff000000], [0xffffffff, 0xff, 0xffffff00], 'wg2\x00', 'veth0\x00', {}, {}, 0x2c, 0x7f, 0x2, 0x10}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xd}}, @inet=@rpfilter={{0x28}, {0x11}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv6=@empty, 0xf, 0x2a, 0xffc1}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30}, {0x33, 0x4, 0x7, 0x80, 0xffff, 0x21976205b2c8c05c, 0x1000}}, @inet=@rpfilter={{0x28}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, [0xff, 0xffffff00, 0xffffff00, 0xff000000], [0xffffffff, 0xff, 0xffffffff, 0xff000000], 'team_slave_1\x00', 'pim6reg0\x00', {0xff}, {0xff}, 0xd, 0x7, 0x1, 0x44}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0x17}, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0x0, 0xffff00, 0xffffffff], [0x0, 0xff, 0x0, 0xffffffff], 'rose0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x3c, 0x7f, 0x3, 0xc}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}, @common=@mh={{0x28}, {"5b18", 0x1}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xb78b}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x9}}, @inet=@rpfilter={{0x28}, {0x1}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x2}, {0xffffffffffffffff, 0x6, 0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r2, 0x30, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) 01:24:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/shm\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='objagg_obj_root_create\x00', r2}, 0x10) r5 = syz_io_uring_complete(0x0) r6 = syz_io_uring_complete(0x0) r7 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r7) sendmsg$L2TP_CMD_SESSION_CREATE(r7, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x14}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x34}}, 0x4000000) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r9 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r9, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000440)=0x101) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x11, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @generic={0x3, 0x9, 0x1, 0x80, 0x1}, @generic={0x4, 0x0, 0x5, 0xdcd, 0x9}, @alu={0x4, 0x1, 0x5, 0x9, 0x1, 0xffffffffffffffc0}, @ldst={0x0, 0x2, 0x0, 0x6, 0xa, 0xfffffffffffffeab, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xce, &(0x7f0000000100)=""/206, 0x40f00, 0xc, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xc, 0xffff, 0x69}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r3, 0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r8, 0xffffffffffffffff], 0x0, 0x10, 0x14}, 0x90) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r10 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r10, 0x80047437, &(0x7f0000000400)) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) syz_io_uring_complete(0x0) (async) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x2) r7 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_FD(r7, 0x4c00, r5) (async) ioctl$LOOP_SET_FD(r7, 0x4c00, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x7, @empty, 0x6}, r8}}, 0x30) 01:24:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/shm\x00', 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='objagg_obj_root_create\x00', r2}, 0x10) (async) r5 = syz_io_uring_complete(0x0) r6 = syz_io_uring_complete(0x0) (async, rerun: 64) r7 = socket(0x29, 0x2, 0x400) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r7) sendmsg$L2TP_CMD_SESSION_CREATE(r7, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x14}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x34}}, 0x4000000) (async) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r9 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r9, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000440)=0x101) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x11, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @generic={0x3, 0x9, 0x1, 0x80, 0x1}, @generic={0x4, 0x0, 0x5, 0xdcd, 0x9}, @alu={0x4, 0x1, 0x5, 0x9, 0x1, 0xffffffffffffffc0}, @ldst={0x0, 0x2, 0x0, 0x6, 0xa, 0xfffffffffffffeab, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xce, &(0x7f0000000100)=""/206, 0x40f00, 0xc, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xc, 0xffff, 0x69}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r3, 0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r8, 0xffffffffffffffff], 0x0, 0x10, 0x14}, 0x90) (async, rerun: 64) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r10 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r10, 0x80047437, &(0x7f0000000400)) 01:24:23 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a40)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x268, 0x140, 0x338, 0x140, 0x458, 0x578, 0x578, 0x578, 0x578, 0x578, 0x6, &(0x7f0000000240), {[{{@ipv6={@mcast2, @mcast2, [0xffffff00, 0x6cf43ea416100009, 0xff000000, 0xff000000], [0xffffffff, 0xff, 0xffffff00], 'wg2\x00', 'veth0\x00', {}, {}, 0x2c, 0x7f, 0x2, 0x10}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xd}}, @inet=@rpfilter={{0x28}, {0x11}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv6=@empty, 0xf, 0x2a, 0xffc1}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30}, {0x33, 0x4, 0x7, 0x80, 0xffff, 0x21976205b2c8c05c, 0x1000}}, @inet=@rpfilter={{0x28}}]}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x8}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, [0xff, 0xffffff00, 0xffffff00, 0xff000000], [0xffffffff, 0xff, 0xffffffff, 0xff000000], 'team_slave_1\x00', 'pim6reg0\x00', {0xff}, {0xff}, 0xd, 0x7, 0x1, 0x44}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0x17}, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0x0, 0xffff00, 0xffffffff], [0x0, 0xff, 0x0, 0xffffffff], 'rose0\x00', 'veth1_to_team\x00', {0xff}, {0xff}, 0x3c, 0x7f, 0x3, 0xc}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}, @common=@mh={{0x28}, {"5b18", 0x1}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xb78b}}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x9}}, @inet=@rpfilter={{0x28}, {0x1}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x2}, {0xffffffffffffffff, 0x6, 0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a8) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r2, 0x30, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) 01:24:23 executing program 5: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r1, 0x8, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x401, {"05fa6b179437fb0c8c26adfef711c3c0"}, 0x5, 0x1, 0x22}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x118) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r3) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0008000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x88}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1b}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20000000) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000004c0)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) read$msr(r3, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r3, &(0x7f0000000180)=""/201, 0xfdef) 01:24:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) syz_io_uring_complete(0x0) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/shm\x00', 0x0, 0x0) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sysvipc/shm\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='objagg_obj_root_create\x00', r2}, 0x10) r5 = syz_io_uring_complete(0x0) r6 = syz_io_uring_complete(0x0) socket(0x29, 0x2, 0x400) (async) r7 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r7) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r7) sendmsg$L2TP_CMD_SESSION_CREATE(r7, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x14}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}]}, 0x34}}, 0x4000000) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r9 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r9, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000440)=0x101) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x11, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @generic={0x3, 0x9, 0x1, 0x80, 0x1}, @generic={0x4, 0x0, 0x5, 0xdcd, 0x9}, @alu={0x4, 0x1, 0x5, 0x9, 0x1, 0xffffffffffffffc0}, @ldst={0x0, 0x2, 0x0, 0x6, 0xa, 0xfffffffffffffeab, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xce, &(0x7f0000000100)=""/206, 0x40f00, 0xc, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0xc, 0xffff, 0x69}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r3, 0x1, r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r8, 0xffffffffffffffff], 0x0, 0x10, 0x14}, 0x90) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) (async) r10 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGCHAN(r10, 0x80047437, &(0x7f0000000400)) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}}, r7}}, 0x30) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), r3, r1}}, 0x18) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="3f2120000020001c85100000f0ffffff840000000a00000018000000000000000000000081000000588108625f9f6e9bd3afe56dbe445b1b03cf3f"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f00000000c0)=""/145, 0x41100, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x75}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[r0, r1], &(0x7f0000000280)=[{0x0, 0x5, 0x5, 0x5}, {0x0, 0x2, 0x0, 0x3}, {0x0, 0x1, 0xe, 0xc}, {0x1, 0x5, 0xa, 0xb}, {0x0, 0x3, 0x2, 0x6}, {0x1, 0x4, 0x7, 0xa}, {0x3, 0x3, 0xb, 0x4}], 0x10, 0x8000}, 0x90) 01:24:23 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000140)=0x2) syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async) r7 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000cc0)) ioctl$LOOP_SET_FD(r7, 0x4c00, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e1d, 0x7, @empty, 0x6}, r8}}, 0x30) 01:24:23 executing program 5: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) 01:24:23 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000040)={0xb, 0x32, 0xfa00, {0x0, 0xffffffffffffffff, 0x200}}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe447) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x1ff, 0xfffffbff, {"4a6f59a1356f73f5af37c99bc7fb92b4"}, 0xadb, 0x7f, 0x1}}}, 0x90) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000180)=0x1, 0x4) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_io_uring_complete(0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}}, r7}}, 0x30) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async, rerun: 32) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), r3, r1}}, 0x18) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="3f2120000020001c85100000f0ffffff840000000a00000018000000000000000000000081000000588108625f9f6e9bd3afe56dbe445b1b03cf3f"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f00000000c0)=""/145, 0x41100, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x75}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[r0, r1], &(0x7f0000000280)=[{0x0, 0x5, 0x5, 0x5}, {0x0, 0x2, 0x0, 0x3}, {0x0, 0x1, 0xe, 0xc}, {0x1, 0x5, 0xa, 0xb}, {0x0, 0x3, 0x2, 0x6}, {0x1, 0x4, 0x7, 0xa}, {0x3, 0x3, 0xb, 0x4}], 0x10, 0x8000}, 0x90) (rerun: 32) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in={0x2, 0x4e24, @private=0xa010102}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x5, "1048e2", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:23 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000040)={0xb, 0x32, 0xfa00, {0x0, 0xffffffffffffffff, 0x200}}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe447) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x1ff, 0xfffffbff, {"4a6f59a1356f73f5af37c99bc7fb92b4"}, 0xadb, 0x7f, 0x1}}}, 0x90) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000180)=0x1, 0x4) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000040)={0xb, 0x32, 0xfa00, {0x0, 0xffffffffffffffff, 0x200}}, 0x18) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe447) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x1ff, 0xfffffbff, {"4a6f59a1356f73f5af37c99bc7fb92b4"}, 0xadb, 0x7f, 0x1}}}, 0x90) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000180)=0x1, 0x4) (async) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) socket$nl_audit(0x10, 0x3, 0x9) r1 = socket(0x10, 0x2, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0xc001) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001854}, 0x0) 01:24:23 executing program 3: setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/255, 0xff}, &(0x7f00000001c0), 0x10}, 0x20) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000240)=""/106, 0x6a}, &(0x7f00000002c0), 0x18}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3ff, 0x801) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) syz_open_dev$MSR(&(0x7f0000000080), 0x7, 0x0) 01:24:23 executing program 5: syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) 01:24:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) socket$nl_audit(0x10, 0x3, 0x9) r1 = socket(0x10, 0x2, 0x0) (async, rerun: 64) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (rerun: 64) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0xc001) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001854}, 0x0) 01:24:23 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000040)={0xb, 0x32, 0xfa00, {0x0, 0xffffffffffffffff, 0x200}}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe447) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x1ff, 0xfffffbff, {"4a6f59a1356f73f5af37c99bc7fb92b4"}, 0xadb, 0x7f, 0x1}}}, 0x90) (async) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000180)=0x1, 0x4) 01:24:23 executing program 3: setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/255, 0xff}, &(0x7f00000001c0), 0x10}, 0x20) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000240)=""/106, 0x6a}, &(0x7f00000002c0), 0x18}, 0x20) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3ff, 0x801) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) (async) syz_open_dev$MSR(&(0x7f0000000080), 0x7, 0x0) 01:24:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in={0x2, 0x4e24, @private=0xa010102}}}, 0x90) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x5, "1048e2", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}}, r7}}, 0x30) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), r3, r1}}, 0x18) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="3f2120000020001c85100000f0ffffff840000000a00000018000000000000000000000081000000588108625f9f6e9bd3afe56dbe445b1b03cf3f"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f00000000c0)=""/145, 0x41100, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x75}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[r0, r1], &(0x7f0000000280)=[{0x0, 0x5, 0x5, 0x5}, {0x0, 0x2, 0x0, 0x3}, {0x0, 0x1, 0xe, 0xc}, {0x1, 0x5, 0xa, 0xb}, {0x0, 0x3, 0x2, 0x6}, {0x1, 0x4, 0x7, 0xa}, {0x3, 0x3, 0xb, 0x4}], 0x10, 0x8000}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="3f2120000020001c85100000f0ffffff840000000a00000018000000000000000000000081000000588108625f9f6e9bd3afe56dbe445b1b03cf3f"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x91, &(0x7f00000000c0)=""/145, 0x41100, 0x5a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x75}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[r0, r1], &(0x7f0000000280)=[{0x0, 0x5, 0x5, 0x5}, {0x0, 0x2, 0x0, 0x3}, {0x0, 0x1, 0xe, 0xc}, {0x1, 0x5, 0xa, 0xb}, {0x0, 0x3, 0x2, 0x6}, {0x1, 0x4, 0x7, 0xa}, {0x3, 0x3, 0xb, 0x4}], 0x10, 0x8000}, 0x90) 01:24:23 executing program 5: process_vm_writev(0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/97, 0x61}, {0x0}], 0x2, 0x0, 0x0, 0x0) r0 = getpid() r1 = getpid() getpgid(r1) r2 = getpid() getpgid(r2) getpgid(r2) getpgid(r0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) process_vm_writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/13, 0xd}, {&(0x7f00000000c0)=""/47, 0x2f}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/18, 0x12}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/13, 0xd}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x7, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/32, 0x20}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)=""/245, 0xf5}], 0x3, 0x0) r4 = syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) syz_io_uring_setup(0xae8, &(0x7f0000000680)={0x0, 0xe6c9, 0x1, 0x0, 0x6a}, &(0x7f0000000700), &(0x7f0000000740)=0x0) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000780)=0xffffffffffffffff, 0x4) syz_io_uring_submit(0x0, r5, &(0x7f00000007c0)=@IORING_OP_TEE={0x21, 0x8, 0x0, @fd=r4, 0x0, 0x0, 0x8, 0x3, 0x1, {0x0, 0x0, r6}}) syz_open_dev$MSR(&(0x7f0000000040), 0x100000001, 0x0) r7 = getpid() perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x3, 0x0, 0xfe, 0x40, 0x0, 0x5, 0x40, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x7, 0x800}, 0x94501, 0x8, 0x9, 0x7, 0x0, 0x200, 0x1f, 0x0, 0x9, 0x0, 0x3ff}, r7, 0x2, 0xffffffffffffffff, 0x2) 01:24:23 executing program 3: setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/255, 0xff}, &(0x7f00000001c0), 0x10}, 0x20) (async) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000240)=""/106, 0x6a}, &(0x7f00000002c0), 0x18}, 0x20) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3ff, 0x801) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) syz_open_dev$MSR(&(0x7f0000000080), 0x7, 0x0) 01:24:23 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x7, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8083, 0x3, 0x4}}) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in={0x2, 0x4e24, @private=0xa010102}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x5, "1048e2", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:23 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) 01:24:23 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x7, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8083, 0x3, 0x4}}) (async, rerun: 64) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:23 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x17, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="180000851000000300000065638000f4fff52187ba4ad5", @ANYRES32=0x1, @ANYBLOB="00000000fbffffff18210000", @ANYRES32, @ANYBLOB="000000000b020000186200000a0000000000000009000000183700000100000000000000000000008520000001000000181a0000", @ANYRES32, @ANYBLOB="000000000000000018490000fdffffff0000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x35, &(0x7f0000000100)=""/53, 0x41000, 0xe, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x5, 0x5, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000001c0)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x3, 0xa, 0xb}, {0x5, 0x5, 0x9, 0xe}, {0x4, 0x1, 0x3, 0xa}], 0x10, 0xd03e}, 0x90) r1 = syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x34e0, &(0x7f00000003c0)={0x0, 0x63d6, 0x6de, 0x3, 0x3cf, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000440)) r4 = syz_io_uring_complete(r3) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$X86_IOC_RDMSR_REGS(r4, 0xc02063a0, &(0x7f0000000080)=[0x81, 0x0, 0x3f, 0xffffffcd, 0x7, 0x6, 0x7ff, 0x3]) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x34}, 0x10) [ 1520.595398][T14067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14067 comm=syz-executor.1 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) socket$nl_audit(0x10, 0x3, 0x9) (async) socket$nl_audit(0x10, 0x3, 0x9) r1 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0xc001) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001854}, 0x0) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000002c0)=[{0x3d, 0x0, [0x8, 0x2, 0x20d3, 0xda, 0xffffffff, 0x5, 0x4413, 0x9, 0x20, 0xda8, 0x9, 0x3, 0x366, 0x7fff, 0x8001, 0x8]}, {0x23, 0x0, [0x7, 0x0, 0x10001, 0x4, 0x0, 0xffff8f23, 0x100, 0x1, 0x9, 0x1, 0xed59, 0x2, 0x5, 0xbcd, 0x7fff]}, {0xc, 0x0, [0x78, 0x3, 0x1f, 0x10000, 0x7f, 0x7, 0x5, 0x10001, 0x7, 0x7fff, 0x0, 0x8, 0x81, 0x2, 0x1, 0x7aa]}, {0x20, 0x0, [0x7fffffff, 0x1, 0x9, 0x3, 0x8001, 0xfffffff7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x800, 0xffffa418, 0x7fff, 0x3ff, 0x56ef, 0x5]}, {0x12, 0x0, [0x4, 0x5, 0x1, 0xff, 0x10000, 0x2, 0x2, 0x4, 0x401, 0x200, 0x7ff, 0xfffffe00, 0x1, 0x8, 0x0, 0x5]}, {0x1e, 0x0, [0x6, 0x6, 0x10000, 0x10001, 0x0, 0x6, 0xe2, 0x4, 0xffffffff, 0x800, 0x2, 0x79, 0x1, 0x45, 0x8026, 0xfffffff8]}, {0x9, 0x0, [0x57, 0x7fffffff, 0xffffffff, 0x7, 0x10001, 0xfffffe01, 0x79f2, 0x1ff, 0x8, 0xe1, 0x300, 0x4, 0xfffffffa, 0x8513, 0x0, 0x101]}, {0x30, 0x0, [0x10bc0000, 0xb501, 0x7, 0x400, 0x2, 0x0, 0x1000, 0xf9, 0x9846, 0x0, 0x1f0, 0x8, 0x6, 0x3ff, 0x854, 0x8]}, {0x1, 0x0, [0x1, 0x9, 0xfff, 0x7, 0x7fffffff, 0x3, 0x10000, 0x5, 0x5, 0x101, 0x30, 0x54, 0x7f4, 0x10001, 0xfffff300]}, {0x20, 0x0, [0x5, 0x2, 0x9, 0x46, 0x3, 0x8001, 0x2, 0x8, 0x8001, 0x2, 0x3, 0x8, 0x4, 0x0, 0x9, 0xe1]}], r3, 0x1, 0x1, 0x2d0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x800, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x7, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8000, 0x8083, 0x3, 0x4}}) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x17, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="180000851000000300000065638000f4fff52187ba4ad5", @ANYRES32=0x1, @ANYBLOB="00000000fbffffff18210000", @ANYRES32, @ANYBLOB="000000000b020000186200000a0000000000000009000000183700000100000000000000000000008520000001000000181a0000", @ANYRES32, @ANYBLOB="000000000000000018490000fdffffff0000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x35, &(0x7f0000000100)=""/53, 0x41000, 0xe, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x5, 0x5, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000001c0)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x3, 0xa, 0xb}, {0x5, 0x5, 0x9, 0xe}, {0x4, 0x1, 0x3, 0xa}], 0x10, 0xd03e}, 0x90) (async) r1 = syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x34e0, &(0x7f00000003c0)={0x0, 0x63d6, 0x6de, 0x3, 0x3cf, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000440)) r4 = syz_io_uring_complete(r3) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(r4, 0xc02063a0, &(0x7f0000000080)=[0x81, 0x0, 0x3f, 0xffffffcd, 0x7, 0x6, 0x7ff, 0x3]) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x34}, 0x10) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) syz_io_uring_complete(0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {0x0, r2, 0xffffffff}}, 0x18) r5 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x20000) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0xda309765531be9ff, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000002c0)=[{0x3d, 0x0, [0x8, 0x2, 0x20d3, 0xda, 0xffffffff, 0x5, 0x4413, 0x9, 0x20, 0xda8, 0x9, 0x3, 0x366, 0x7fff, 0x8001, 0x8]}, {0x23, 0x0, [0x7, 0x0, 0x10001, 0x4, 0x0, 0xffff8f23, 0x100, 0x1, 0x9, 0x1, 0xed59, 0x2, 0x5, 0xbcd, 0x7fff]}, {0xc, 0x0, [0x78, 0x3, 0x1f, 0x10000, 0x7f, 0x7, 0x5, 0x10001, 0x7, 0x7fff, 0x0, 0x8, 0x81, 0x2, 0x1, 0x7aa]}, {0x20, 0x0, [0x7fffffff, 0x1, 0x9, 0x3, 0x8001, 0xfffffff7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x800, 0xffffa418, 0x7fff, 0x3ff, 0x56ef, 0x5]}, {0x12, 0x0, [0x4, 0x5, 0x1, 0xff, 0x10000, 0x2, 0x2, 0x4, 0x401, 0x200, 0x7ff, 0xfffffe00, 0x1, 0x8, 0x0, 0x5]}, {0x1e, 0x0, [0x6, 0x6, 0x10000, 0x10001, 0x0, 0x6, 0xe2, 0x4, 0xffffffff, 0x800, 0x2, 0x79, 0x1, 0x45, 0x8026, 0xfffffff8]}, {0x9, 0x0, [0x57, 0x7fffffff, 0xffffffff, 0x7, 0x10001, 0xfffffe01, 0x79f2, 0x1ff, 0x8, 0xe1, 0x300, 0x4, 0xfffffffa, 0x8513, 0x0, 0x101]}, {0x30, 0x0, [0x10bc0000, 0xb501, 0x7, 0x400, 0x2, 0x0, 0x1000, 0xf9, 0x9846, 0x0, 0x1f0, 0x8, 0x6, 0x3ff, 0x854, 0x8]}, {0x1, 0x0, [0x1, 0x9, 0xfff, 0x7, 0x7fffffff, 0x3, 0x10000, 0x5, 0x5, 0x101, 0x30, 0x54, 0x7f4, 0x10001, 0xfffff300]}, {0x20, 0x0, [0x5, 0x2, 0x9, 0x46, 0x3, 0x8001, 0x2, 0x8, 0x8001, 0x2, 0x3, 0x8, 0x4, 0x0, 0x9, 0xe1]}], r3, 0x1, 0x1, 0x2d0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x800, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000002c0)=[{0x3d, 0x0, [0x8, 0x2, 0x20d3, 0xda, 0xffffffff, 0x5, 0x4413, 0x9, 0x20, 0xda8, 0x9, 0x3, 0x366, 0x7fff, 0x8001, 0x8]}, {0x23, 0x0, [0x7, 0x0, 0x10001, 0x4, 0x0, 0xffff8f23, 0x100, 0x1, 0x9, 0x1, 0xed59, 0x2, 0x5, 0xbcd, 0x7fff]}, {0xc, 0x0, [0x78, 0x3, 0x1f, 0x10000, 0x7f, 0x7, 0x5, 0x10001, 0x7, 0x7fff, 0x0, 0x8, 0x81, 0x2, 0x1, 0x7aa]}, {0x20, 0x0, [0x7fffffff, 0x1, 0x9, 0x3, 0x8001, 0xfffffff7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x800, 0xffffa418, 0x7fff, 0x3ff, 0x56ef, 0x5]}, {0x12, 0x0, [0x4, 0x5, 0x1, 0xff, 0x10000, 0x2, 0x2, 0x4, 0x401, 0x200, 0x7ff, 0xfffffe00, 0x1, 0x8, 0x0, 0x5]}, {0x1e, 0x0, [0x6, 0x6, 0x10000, 0x10001, 0x0, 0x6, 0xe2, 0x4, 0xffffffff, 0x800, 0x2, 0x79, 0x1, 0x45, 0x8026, 0xfffffff8]}, {0x9, 0x0, [0x57, 0x7fffffff, 0xffffffff, 0x7, 0x10001, 0xfffffe01, 0x79f2, 0x1ff, 0x8, 0xe1, 0x300, 0x4, 0xfffffffa, 0x8513, 0x0, 0x101]}, {0x30, 0x0, [0x10bc0000, 0xb501, 0x7, 0x400, 0x2, 0x0, 0x1000, 0xf9, 0x9846, 0x0, 0x1f0, 0x8, 0x6, 0x3ff, 0x854, 0x8]}, {0x1, 0x0, [0x1, 0x9, 0xfff, 0x7, 0x7fffffff, 0x3, 0x10000, 0x5, 0x5, 0x101, 0x30, 0x54, 0x7f4, 0x10001, 0xfffff300]}, {0x20, 0x0, [0x5, 0x2, 0x9, 0x46, 0x3, 0x8001, 0x2, 0x8, 0x8001, 0x2, 0x3, 0x8, 0x4, 0x0, 0x9, 0xe1]}], r3, 0x1, 0x1, 0x2d0}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x800, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x17, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="180000851000000300000065638000f4fff52187ba4ad5", @ANYRES32=0x1, @ANYBLOB="00000000fbffffff18210000", @ANYRES32, @ANYBLOB="000000000b020000186200000a0000000000000009000000183700000100000000000000000000008520000001000000181a0000", @ANYRES32, @ANYBLOB="000000000000000018490000fdffffff0000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x35, &(0x7f0000000100)=""/53, 0x41000, 0xe, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x5, 0x5, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000001c0)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000200)=[{0x4, 0x3, 0xa, 0xb}, {0x5, 0x5, 0x9, 0xe}, {0x4, 0x1, 0x3, 0xa}], 0x10, 0xd03e}, 0x90) (async) r1 = syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) (async) syz_io_uring_setup(0x34e0, &(0x7f00000003c0)={0x0, 0x63d6, 0x6de, 0x3, 0x3cf, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000440)) r4 = syz_io_uring_complete(r3) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(r4, 0xc02063a0, &(0x7f0000000080)=[0x81, 0x0, 0x3f, 0xffffffcd, 0x7, 0x6, 0x7ff, 0x3]) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x34}, 0x10) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0xf8, 0x0, 0xb, 0x18, "9a4371dc7579716cab6830e849f7bcda34eaf36ae5bf45d0a5ce45c83343fa0f4ad1d79ddea362dc25785c3f4b3810425c146fd632c66619efd4ebe98e2c0a52", "3e9a34f0ca24db1d02e745717333d78802fc7ee7c3cf2354c31f96c2c8b0c4c2", [0x4, 0x8]}) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000280)=""/214, 0xd6) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf23) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x322e) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r8) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00') r10 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r10, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) r11 = syz_open_dev$vcsu(&(0x7f0000000100), 0x2, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r11, &(0x7f00000008c0)={0x13, 0x10, 0xfa00, {&(0x7f00000006c0), r12}}, 0x18) syz_io_uring_setup(0x16b8, &(0x7f0000000240)={0x0, 0x5a80, 0x8, 0x0, 0x2e8, 0x0, r7}, &(0x7f0000000140), &(0x7f00000003c0)=0x0) syz_io_uring_submit(0x0, r13, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r4, 0x7}}, 0xfffffffffffffffe) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) syz_io_uring_complete(0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {0x0, r2, 0xffffffff}}, 0x18) r5 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x20000) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0xda309765531be9ff, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) syz_io_uring_complete(0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {0x0, r2, 0xffffffff}}, 0x18) (async) syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x20000) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0xda309765531be9ff, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) (async) 01:24:24 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000280)=""/214, 0xd6) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000002c0)=[{0x3d, 0x0, [0x8, 0x2, 0x20d3, 0xda, 0xffffffff, 0x5, 0x4413, 0x9, 0x20, 0xda8, 0x9, 0x3, 0x366, 0x7fff, 0x8001, 0x8]}, {0x23, 0x0, [0x7, 0x0, 0x10001, 0x4, 0x0, 0xffff8f23, 0x100, 0x1, 0x9, 0x1, 0xed59, 0x2, 0x5, 0xbcd, 0x7fff]}, {0xc, 0x0, [0x78, 0x3, 0x1f, 0x10000, 0x7f, 0x7, 0x5, 0x10001, 0x7, 0x7fff, 0x0, 0x8, 0x81, 0x2, 0x1, 0x7aa]}, {0x20, 0x0, [0x7fffffff, 0x1, 0x9, 0x3, 0x8001, 0xfffffff7, 0x0, 0xffff, 0xfffffffc, 0x0, 0x800, 0xffffa418, 0x7fff, 0x3ff, 0x56ef, 0x5]}, {0x12, 0x0, [0x4, 0x5, 0x1, 0xff, 0x10000, 0x2, 0x2, 0x4, 0x401, 0x200, 0x7ff, 0xfffffe00, 0x1, 0x8, 0x0, 0x5]}, {0x1e, 0x0, [0x6, 0x6, 0x10000, 0x10001, 0x0, 0x6, 0xe2, 0x4, 0xffffffff, 0x800, 0x2, 0x79, 0x1, 0x45, 0x8026, 0xfffffff8]}, {0x9, 0x0, [0x57, 0x7fffffff, 0xffffffff, 0x7, 0x10001, 0xfffffe01, 0x79f2, 0x1ff, 0x8, 0xe1, 0x300, 0x4, 0xfffffffa, 0x8513, 0x0, 0x101]}, {0x30, 0x0, [0x10bc0000, 0xb501, 0x7, 0x400, 0x2, 0x0, 0x1000, 0xf9, 0x9846, 0x0, 0x1f0, 0x8, 0x6, 0x3ff, 0x854, 0x8]}, {0x1, 0x0, [0x1, 0x9, 0xfff, 0x7, 0x7fffffff, 0x3, 0x10000, 0x5, 0x5, 0x101, 0x30, 0x54, 0x7f4, 0x10001, 0xfffff300]}, {0x20, 0x0, [0x5, 0x2, 0x9, 0x46, 0x3, 0x8001, 0x2, 0x8, 0x8001, 0x2, 0x3, 0x8, 0x4, 0x0, 0x9, 0xe1]}], r3, 0x1, 0x1, 0x2d0}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x800, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x800, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) syz_open_dev$loop(&(0x7f0000000400), 0x68, 0x6c00) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf23) (async) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x322e) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r8) (async) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) (async) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00') (async) r10 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r10, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) (async, rerun: 32) r11 = syz_open_dev$vcsu(&(0x7f0000000100), 0x2, 0x80000) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r11, &(0x7f00000008c0)={0x13, 0x10, 0xfa00, {&(0x7f00000006c0), r12}}, 0x18) syz_io_uring_setup(0x16b8, &(0x7f0000000240)={0x0, 0x5a80, 0x8, 0x0, 0x2e8, 0x0, r7}, &(0x7f0000000140), &(0x7f00000003c0)=0x0) syz_io_uring_submit(0x0, r13, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r4, 0x7}}, 0xfffffffffffffffe) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000280)=""/214, 0xd6) (async) read$msr(r0, &(0x7f0000000280)=""/214, 0xd6) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) syz_io_uring_complete(0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {0x0, r2, 0xffffffff}}, 0x18) r5 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x20000) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0xda309765531be9ff, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) syz_io_uring_complete(0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {0x0, r2, 0xffffffff}}, 0x18) (async) syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x20000) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0xda309765531be9ff, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) (async) 01:24:24 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) (async) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='sched_switch\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf23) (async) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x322e) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r8) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00') (async) r10 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r10, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) (async) r11 = syz_open_dev$vcsu(&(0x7f0000000100), 0x2, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r11, &(0x7f00000008c0)={0x13, 0x10, 0xfa00, {&(0x7f00000006c0), r12}}, 0x18) syz_io_uring_setup(0x16b8, &(0x7f0000000240)={0x0, 0x5a80, 0x8, 0x0, 0x2e8, 0x0, r7}, &(0x7f0000000140), &(0x7f00000003c0)=0x0) syz_io_uring_submit(0x0, r13, &(0x7f0000000300)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r4, 0x7}}, 0xfffffffffffffffe) 01:24:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c080}, 0x8800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), r0) r2 = syz_open_dev$vcsu(&(0x7f0000000140), 0x6, 0x90980) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x10, 0x0, @in={0x2, 0x4e22, @rand_addr=0x64010101}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x100) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r4, 0x3}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000000680)={0xb, 0x10, 0xfa00, {&(0x7f00000005c0), r4, 0x6}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) r6 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r8 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r10, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r10, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r9, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000840)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000700)=[{0xa, 0x0, [0x2, 0x6, 0x8, 0x0, 0x43db1d00, 0xff, 0x6, 0x538c, 0x0, 0x0, 0x2, 0xffff, 0x8001, 0xff, 0x7fffffff, 0x7]}, {0x16, 0x0, [0x9f7, 0x7, 0x7ff, 0x962, 0x7, 0xfff, 0x1000, 0x33a, 0xfffffff8, 0x3, 0x8, 0x2188, 0x9, 0x401, 0x8, 0x8]}, {0x31, 0x0, [0x8, 0x80, 0x6, 0x5c9, 0xa7cc, 0x2, 0x5, 0xc7, 0x3, 0x6, 0x6, 0x2, 0x2, 0x5, 0x1, 0x3]}, {0x2, 0x0, [0x2, 0x6, 0x3, 0x2c13, 0x0, 0xf06, 0x8, 0x0, 0x36aa7460, 0x3, 0xffffffff, 0x9, 0x0, 0x5, 0x200, 0x5]}], r9, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r7, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x5}}, 0x10) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000540)={r2, r1, 0x8}, 0x10) 01:24:24 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) syz_open_dev$MSR(&(0x7f0000000040), 0x0, 0x0) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/216, 0xd8) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) (async) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c080}, 0x8800) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), r0) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000140), 0x6, 0x90980) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x10, 0x0, @in={0x2, 0x4e22, @rand_addr=0x64010101}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x100) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r4, 0x3}}, 0x48) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000000680)={0xb, 0x10, 0xfa00, {&(0x7f00000005c0), r4, 0x6}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) (async) r6 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r8 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r10, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r10, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r9, 0xcc9f}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000840)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000700)=[{0xa, 0x0, [0x2, 0x6, 0x8, 0x0, 0x43db1d00, 0xff, 0x6, 0x538c, 0x0, 0x0, 0x2, 0xffff, 0x8001, 0xff, 0x7fffffff, 0x7]}, {0x16, 0x0, [0x9f7, 0x7, 0x7ff, 0x962, 0x7, 0xfff, 0x1000, 0x33a, 0xfffffff8, 0x3, 0x8, 0x2188, 0x9, 0x401, 0x8, 0x8]}, {0x31, 0x0, [0x8, 0x80, 0x6, 0x5c9, 0xa7cc, 0x2, 0x5, 0xc7, 0x3, 0x6, 0x6, 0x2, 0x2, 0x5, 0x1, 0x3]}, {0x2, 0x0, [0x2, 0x6, 0x3, 0x2c13, 0x0, 0xf06, 0x8, 0x0, 0x36aa7460, 0x3, 0xffffffff, 0x9, 0x0, 0x5, 0x200, 0x5]}], r9, 0x1, 0x1, 0x120}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r7, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x5}}, 0x10) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7fff) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffff9, 0xffff2de7, "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", 0x22, 0x3, 0x8a, 0x2, 0xdc, 0x7, 0x7f, 0x1}}}, 0x120) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000, 0x1}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x4, '\x00', "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x686, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x30) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r0, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @rand_addr=0x64010100}, @in6={0xa, 0x4e21, 0x2b6, @remote, 0x3f}}}, 0x118) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/216, 0xd8) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000ec0), r0) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c080}, 0x8800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), r0) r2 = syz_open_dev$vcsu(&(0x7f0000000140), 0x6, 0x90980) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x10, 0x0, @in={0x2, 0x4e22, @rand_addr=0x64010101}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x100) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r4, 0x3}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r4, 0x3}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000000680)={0xb, 0x10, 0xfa00, {&(0x7f00000005c0), r4, 0x6}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) r6 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r8 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r10, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r10, &(0x7f0000000900)='./file0\x00', 0x80) (async) inotify_add_watch(r10, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r10, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r9, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000840)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000700)=[{0xa, 0x0, [0x2, 0x6, 0x8, 0x0, 0x43db1d00, 0xff, 0x6, 0x538c, 0x0, 0x0, 0x2, 0xffff, 0x8001, 0xff, 0x7fffffff, 0x7]}, {0x16, 0x0, [0x9f7, 0x7, 0x7ff, 0x962, 0x7, 0xfff, 0x1000, 0x33a, 0xfffffff8, 0x3, 0x8, 0x2188, 0x9, 0x401, 0x8, 0x8]}, {0x31, 0x0, [0x8, 0x80, 0x6, 0x5c9, 0xa7cc, 0x2, 0x5, 0xc7, 0x3, 0x6, 0x6, 0x2, 0x2, 0x5, 0x1, 0x3]}, {0x2, 0x0, [0x2, 0x6, 0x3, 0x2c13, 0x0, 0xf06, 0x8, 0x0, 0x36aa7460, 0x3, 0xffffffff, 0x9, 0x0, 0x5, 0x200, 0x5]}], r9, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r7, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x5}}, 0x10) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffff9, 0xffff2de7, "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", 0x22, 0x3, 0x8a, 0x2, 0xdc, 0x7, 0x7f, 0x1}}}, 0x120) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000, 0x1}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x4, '\x00', "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"}}, 0x110) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x686, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x686, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x30) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r0, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @rand_addr=0x64010100}, @in6={0xa, 0x4e21, 0x2b6, @remote, 0x3f}}}, 0x118) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/216, 0xd8) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r1, &(0x7f0000000280)=""/216, 0xd8) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x686, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x30) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) syz_io_uring_complete(0x0) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r0, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @rand_addr=0x64010100}, @in6={0xa, 0x4e21, 0x2b6, @remote, 0x3f}}}, 0x118) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffff9, 0xffff2de7, "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", 0x22, 0x3, 0x8a, 0x2, 0xdc, 0x7, 0x7f, 0x1}}}, 0x120) (async) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000, 0x1}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x4, '\x00', "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r4}}, 0xc) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x94442) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x80}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='cachefiles_ref\x00', r1}, 0x10) r2 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x20, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffe, 0x40000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x45a, 0x3, 0x10000, 0x0, 0x7, 0x80, 0x7f, 0x0, 0x18b7c00, 0x0, 0x1f}, 0xffffffffffffffff, 0x7, r1, 0x3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x80, 0x80, 0xca, 0x81, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x821, 0x2, 0x7fffffff, 0x3, 0x7, 0x81, 0x101, 0x0, 0x1, 0x0, 0x5}) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000280)) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x80, 0x105000) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) read$msr(r1, &(0x7f0000000140)=""/14, 0xe) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r3, 0x1c, 0x1, @in={0x2, 0x4e22, @empty}}}, 0xa0) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x94442) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x80}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='cachefiles_ref\x00', r1}, 0x10) (async) r2 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x20, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffe, 0x40000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x45a, 0x3, 0x10000, 0x0, 0x7, 0x80, 0x7f, 0x0, 0x18b7c00, 0x0, 0x1f}, 0xffffffffffffffff, 0x7, r1, 0x3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x80, 0x80, 0xca, 0x81, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x821, 0x2, 0x7fffffff, 0x3, 0x7, 0x81, 0x101, 0x0, 0x1, 0x0, 0x5}) 01:24:24 executing program 0: write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x4, 0x200640) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffff2a4}}, 0x10) perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x8, 0x40, 0x6, 0x7, 0x0, 0x2, 0x500, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x5040, 0x1, 0xffffff01, 0x8, 0xcfa, 0x1257dbf3, 0x5, 0x0, 0x4589bd74, 0x0, 0x7fffffffffffffff}, r1, 0x9, 0xffffffffffffffff, 0x8) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 0: write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x4, 0x200640) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffff2a4}}, 0x10) perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x8, 0x40, 0x6, 0x7, 0x0, 0x2, 0x500, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x5040, 0x1, 0xffffff01, 0x8, 0xcfa, 0x1257dbf3, 0x5, 0x0, 0x4589bd74, 0x0, 0x7fffffffffffffff}, r1, 0x9, 0xffffffffffffffff, 0x8) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x80, 0x105000) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) read$msr(r1, &(0x7f0000000140)=""/14, 0xe) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r3, 0x1c, 0x1, @in={0x2, 0x4e22, @empty}}}, 0xa0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x80, 0x105000) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) read$msr(r1, &(0x7f0000000140)=""/14, 0xe) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r3, 0x1c, 0x1, @in={0x2, 0x4e22, @empty}}}, 0xa0) (async) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x94442) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x80}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x80}}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='cachefiles_ref\x00', r1}, 0x10) r2 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x20, 0x9, 0x5, 0x4, 0x0, 0xfffffffffffffffe, 0x40000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x45a, 0x3, 0x10000, 0x0, 0x7, 0x80, 0x7f, 0x0, 0x18b7c00, 0x0, 0x1f}, 0xffffffffffffffff, 0x7, r1, 0x3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000240)={0x1, 0x80, 0x80, 0x80, 0xca, 0x81, 0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x821, 0x2, 0x7fffffff, 0x3, 0x7, 0x81, 0x101, 0x0, 0x1, 0x0, 0x5}) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000180)=0x4, 0x4) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x81, @loopback, 0x2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in6={0xa, 0x4e20, 0x0, @private1, 0x7f}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{0x4, 0x0, [0xf2, 0x2, 0x7fff, 0x3, 0x4, 0x80000000, 0x3, 0xcae0, 0x6, 0x4, 0x7f2f55e, 0x7ff, 0x8, 0x5, 0x68, 0x101]}], r1, 0x1, 0x1, 0x48}}, 0x20) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:24 executing program 0: write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x1}}, 0x18) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x4, 0x200640) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xfffff2a4}}, 0x10) (async) perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x8, 0x40, 0x6, 0x7, 0x0, 0x2, 0x500, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000040), 0x6}, 0x5040, 0x1, 0xffffff01, 0x8, 0xcfa, 0x1257dbf3, 0x5, 0x0, 0x4589bd74, 0x0, 0x7fffffffffffffff}, r1, 0x9, 0xffffffffffffffff, 0x8) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 2: r0 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000040)={0x1, @delete_reserved_lt_addr={{0xc75, 0x1}, {0x6}}}, 0x5) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000180)=0x4, 0x4) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x81, @loopback, 0x2}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in6={0xa, 0x4e20, 0x0, @private1, 0x7f}}}, 0x90) (async) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{0x4, 0x0, [0xf2, 0x2, 0x7fff, 0x3, 0x4, 0x80000000, 0x3, 0xcae0, 0x6, 0x4, 0x7f2f55e, 0x7ff, 0x8, 0x5, 0x68, 0x101]}], r1, 0x1, 0x1, 0x48}}, 0x20) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) read$msr(r0, &(0x7f0000000280)=""/176, 0xb0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) sendmsg$rds(r0, &(0x7f0000002c80)={&(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000002740)=[{&(0x7f00000000c0)=""/137, 0x89}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/198, 0xc6}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/206, 0xce}, {&(0x7f0000002540)=""/185, 0xb9}, {&(0x7f0000002600)=""/166, 0xa6}, {&(0x7f00000026c0)=""/43, 0x2b}, {&(0x7f0000002700)=""/40, 0x28}], 0x9, &(0x7f0000002a80)=[@mask_cswp={0x58, 0x114, 0x9, {{0x0, 0x6}, &(0x7f0000002800)=0x15d072d7, &(0x7f0000002840)=0xdafa, 0x101, 0x6, 0x0, 0x8, 0x47, 0x1}}, @mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6a9}, &(0x7f0000002880)=0x9, &(0x7f00000028c0)=0x2, 0x100, 0x6, 0x8, 0x4, 0x4, 0x16b9}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff8, 0x10000}, &(0x7f0000002900)=0x3, &(0x7f0000002940)=0x2, 0x8, 0x5, 0x2, 0x6, 0x2c}}, @rdma_dest={0x18, 0x114, 0x2, {0xffff, 0x5}}, @rdma_dest={0x18, 0x114, 0x2, {0x1, 0x4}}, @cswp={0x58, 0x114, 0x7, {{0x2, 0xfffffffb}, &(0x7f0000002980)=0x7, &(0x7f00000029c0)=0x4c7, 0x81, 0x6, 0x3, 0x2, 0x40, 0xfffffffffffffffa}}, @fadd={0x58, 0x114, 0x6, {{0x3f64, 0x7}, &(0x7f0000002a00)=0x3, &(0x7f0000002a40)=0x400, 0xf4, 0x6, 0x1ff, 0x1f, 0x20, 0x2}}], 0x1e8, 0x81}, 0x81) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x9ce9, 0x5, {"85e5f8fc075d808b64bb665394aa6302"}, 0xcf, 0x885, 0x9}, @ib={0x1b, 0x9, 0x5, {"03000000000000000900"}, 0x547e5134, 0x81, 0x9}}}, 0x118) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x80, 0x105000) (async, rerun: 64) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) read$msr(r1, &(0x7f0000000140)=""/14, 0xe) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r3, 0x1c, 0x1, @in={0x2, 0x4e22, @empty}}}, 0xa0) 01:24:24 executing program 2: r0 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000040)={0x1, @delete_reserved_lt_addr={{0xc75, 0x1}, {0x6}}}, 0x5) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000180)=0x4, 0x4) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x81, @loopback, 0x2}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000640)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in6={0xa, 0x4e20, 0x0, @private1, 0x7f}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000600)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r4, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{0x4, 0x0, [0xf2, 0x2, 0x7fff, 0x3, 0x4, 0x80000000, 0x3, 0xcae0, 0x6, 0x4, 0x7f2f55e, 0x7ff, 0x8, 0x5, 0x68, 0x101]}], r1, 0x1, 0x1, 0x48}}, 0x20) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000080)=""/201, 0xc9) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) (async) read$msr(r0, &(0x7f0000000280)=""/176, 0xb0) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) sendmsg$rds(r0, &(0x7f0000002c80)={&(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000002740)=[{&(0x7f00000000c0)=""/137, 0x89}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/198, 0xc6}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/206, 0xce}, {&(0x7f0000002540)=""/185, 0xb9}, {&(0x7f0000002600)=""/166, 0xa6}, {&(0x7f00000026c0)=""/43, 0x2b}, {&(0x7f0000002700)=""/40, 0x28}], 0x9, &(0x7f0000002a80)=[@mask_cswp={0x58, 0x114, 0x9, {{0x0, 0x6}, &(0x7f0000002800)=0x15d072d7, &(0x7f0000002840)=0xdafa, 0x101, 0x6, 0x0, 0x8, 0x47, 0x1}}, @mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6a9}, &(0x7f0000002880)=0x9, &(0x7f00000028c0)=0x2, 0x100, 0x6, 0x8, 0x4, 0x4, 0x16b9}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff8, 0x10000}, &(0x7f0000002900)=0x3, &(0x7f0000002940)=0x2, 0x8, 0x5, 0x2, 0x6, 0x2c}}, @rdma_dest={0x18, 0x114, 0x2, {0xffff, 0x5}}, @rdma_dest={0x18, 0x114, 0x2, {0x1, 0x4}}, @cswp={0x58, 0x114, 0x7, {{0x2, 0xfffffffb}, &(0x7f0000002980)=0x7, &(0x7f00000029c0)=0x4c7, 0x81, 0x6, 0x3, 0x2, 0x40, 0xfffffffffffffffa}}, @fadd={0x58, 0x114, 0x6, {{0x3f64, 0x7}, &(0x7f0000002a00)=0x3, &(0x7f0000002a40)=0x400, 0xf4, 0x6, 0x1ff, 0x1f, 0x20, 0x2}}], 0x1e8, 0x81}, 0x81) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x9ce9, 0x5, {"85e5f8fc075d808b64bb665394aa6302"}, 0xcf, 0x885, 0x9}, @ib={0x1b, 0x9, 0x5, {"03000000000000000900"}, 0x547e5134, 0x81, 0x9}}}, 0x118) 01:24:24 executing program 2: r0 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000040)={0x1, @delete_reserved_lt_addr={{0xc75, 0x1}, {0x6}}}, 0x5) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) syz_io_uring_complete(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x0, r0}, 0x18) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket(0x1d, 0x3, 0x1) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x80, 0x20000, @private1}}}, 0x30) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r0}}, 0x18) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, r4, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x12}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x200080d0}, 0x800) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) read$msr(r0, &(0x7f0000000280)=""/176, 0xb0) (async) read$msr(r0, &(0x7f0000000280)=""/176, 0xb0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) sendmsg$rds(r0, &(0x7f0000002c80)={&(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000002740)=[{&(0x7f00000000c0)=""/137, 0x89}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/198, 0xc6}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/206, 0xce}, {&(0x7f0000002540)=""/185, 0xb9}, {&(0x7f0000002600)=""/166, 0xa6}, {&(0x7f00000026c0)=""/43, 0x2b}, {&(0x7f0000002700)=""/40, 0x28}], 0x9, &(0x7f0000002a80)=[@mask_cswp={0x58, 0x114, 0x9, {{0x0, 0x6}, &(0x7f0000002800)=0x15d072d7, &(0x7f0000002840)=0xdafa, 0x101, 0x6, 0x0, 0x8, 0x47, 0x1}}, @mask_cswp={0x58, 0x114, 0x9, {{0x4, 0x6a9}, &(0x7f0000002880)=0x9, &(0x7f00000028c0)=0x2, 0x100, 0x6, 0x8, 0x4, 0x4, 0x16b9}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffff8, 0x10000}, &(0x7f0000002900)=0x3, &(0x7f0000002940)=0x2, 0x8, 0x5, 0x2, 0x6, 0x2c}}, @rdma_dest={0x18, 0x114, 0x2, {0xffff, 0x5}}, @rdma_dest={0x18, 0x114, 0x2, {0x1, 0x4}}, @cswp={0x58, 0x114, 0x7, {{0x2, 0xfffffffb}, &(0x7f0000002980)=0x7, &(0x7f00000029c0)=0x4c7, 0x81, 0x6, 0x3, 0x2, 0x40, 0xfffffffffffffffa}}, @fadd={0x58, 0x114, 0x6, {{0x3f64, 0x7}, &(0x7f0000002a00)=0x3, &(0x7f0000002a40)=0x400, 0xf4, 0x6, 0x1ff, 0x1f, 0x20, 0x2}}], 0x1e8, 0x81}, 0x81) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1000}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0xc080}, 0x40001) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket(0x1d, 0x3, 0x1) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x80, 0x20000, @private1}}}, 0x30) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r0}}, 0x18) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, r4, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x12}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x200080d0}, 0x800) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket(0x1d, 0x3, 0x1) (async) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x80, 0x20000, @private1}}}, 0x30) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r0}}, 0x18) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, r4, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x12}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x200080d0}, 0x800) (async) 01:24:24 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) syz_io_uring_complete(0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {0x0, r2}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00', 0x7}, r5}}, 0x30) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x9ce9, 0x5, {"85e5f8fc075d808b64bb665394aa6302"}, 0xcf, 0x885, 0x9}, @ib={0x1b, 0x9, 0x5, {"03000000000000000900"}, 0x547e5134, 0x81, 0x9}}}, 0x118) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1000}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0xc080}, 0x40001) 01:24:24 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) 01:24:24 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1000}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0xc080}, 0x40001) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {0x0, r2}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async, rerun: 64) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00', 0x7}, r5}}, 0x30) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket(0x1d, 0x3, 0x1) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x80, 0x20000, @private1}}}, 0x30) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r3, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r2, r0}}, 0x18) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r3) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, r4, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x12}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x200080d0}, 0x800) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048044}, 0x800) 01:24:24 executing program 2: r0 = syz_io_uring_complete(0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x1f, 0x80, 0x6, 0x0, 0x4, 0x120, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x880, 0x5, 0x2, 0x9, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0xa}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x44c}, 0x1, 0x0, 0x0, 0x8081}, 0x834) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xe109}, 0x8) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r1, 0x401, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0xfffffff8, {"36aeb7b775fddcb13a61b44cc4c4e5ec"}, 0x5, 0x7}, @ib={0x1b, 0x2, 0x800, {"ee8146574bf9c99b1665691fc4baa5f4"}, 0x3, 0xff, 0x6}}}, 0x118) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r5) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4080}, 0x200000c0) r6 = inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PPPIOCGFLAGS(r7, 0x8004745a, &(0x7f0000000680)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) r8 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r8, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) inotify_rm_watch(r8, r6) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r9 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r9, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r10, 0x40}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000004c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x1, 0x47, "6f87bf90af447d8bae2e58874b4f164a30109f980b8dc6dde008dbe6f83e6b720bc3ade05acbc2835c7701bc0efcf13b3571e0ef3c1696795fd1870805ccbb8fae6941843b7aab01772bd4e228e691a8e9d5276fd4144df019675dde547069d27d97beea29d975b88e046a48fe405afd2f65afdf2d4dccb96c34ff9a2837a126517593a0a2fe105373c8873186e0f4c9c913fd6b6188b0bcf797f0af3589b47d57183a74bd8e01b8dcd8e3c2e943a338be09b7f136dfa7dc92f3c8953ac01115ab5deb8ba7d64757e2571459f64fcea9c6911ae61c4f1e6f299b12c3c48f0f31ad2cffd9bdbd760e741d7f40296cc46afe6e2f326794313f3c8ba447027d8098", 0x6, 0x1, 0x8, 0xff, 0x8, 0x0, 0x2}, r11}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r2 = socket(0x10, 0x2, 0x0) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048044}, 0x800) 01:24:24 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {0x0, r2}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00', 0x7}, r5}}, 0x30) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) read$msr(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 01:24:24 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048044}, 0x800) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) socket(0x10, 0x2, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048044}, 0x800) (async) 01:24:24 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x100, 0x70bd27, 0x25dfdbfb, "", ["", ""]}, 0x10}}, 0x8000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r4 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000007c0)={0x4, 0x80, 0x0, 0x1f, 0x5, 0xff, 0x0, 0x8, 0x3001c, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000003c0), 0xa}, 0x20, 0x7fff, 0x9, 0x7, 0x2, 0xd7b1, 0x5, 0x0, 0xfffffffc, 0x0, 0x9}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/slabinfo\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x9, &(0x7f0000000140)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x36}, @call={0x85, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x16, '\x00', r3, 0x3, r5, 0x8, &(0x7f0000000240)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x2, 0xfffffff8, 0x1}, 0x10, r6, 0xffffffffffffffff, 0x7, &(0x7f0000000640)=[0x1], &(0x7f0000000680)=[{0x4, 0x3, 0x80007, 0xb}, {0x0, 0x3, 0x5, 0x7}, {0x4, 0x5, 0x10, 0x8}, {0x1, 0x5, 0x5, 0x4}, {0x5, 0x5, 0x10, 0x9}, {0x0, 0x1, 0xa, 0xc}, {0x2, 0x1, 0xc, 0x8}], 0x10, 0x8}, 0x90) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) 01:24:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r1, 0x401, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0xfffffff8, {"36aeb7b775fddcb13a61b44cc4c4e5ec"}, 0x5, 0x7}, @ib={0x1b, 0x2, 0x800, {"ee8146574bf9c99b1665691fc4baa5f4"}, 0x3, 0xff, 0x6}}}, 0x118) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r5) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4080}, 0x200000c0) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) r6 = inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) r7 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PPPIOCGFLAGS(r7, 0x8004745a, &(0x7f0000000680)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) syz_io_uring_complete(0x0) (async) r8 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r8, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r8, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) inotify_rm_watch(r8, r6) (async) inotify_rm_watch(r8, r6) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r9 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r9, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r10, 0x40}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r9, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r10, 0x40}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000004c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x1, 0x47, "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", 0x6, 0x1, 0x8, 0xff, 0x8, 0x0, 0x2}, r11}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:24 executing program 2: r0 = syz_io_uring_complete(0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x1f, 0x80, 0x6, 0x0, 0x4, 0x120, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x880, 0x5, 0x2, 0x9, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0xa}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x44c}, 0x1, 0x0, 0x0, 0x8081}, 0x834) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xe109}, 0x8) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) syz_io_uring_complete(0x0) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x1f, 0x80, 0x6, 0x0, 0x4, 0x120, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x880, 0x5, 0x2, 0x9, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x7, 0xffffffffffffffff, 0x0) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0xa}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x44c}, 0x1, 0x0, 0x0, 0x8081}, 0x834) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xe109}, 0x8) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) (async) 01:24:24 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) read$msr(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r1, 0x401, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0xfffffff8, {"36aeb7b775fddcb13a61b44cc4c4e5ec"}, 0x5, 0x7}, @ib={0x1b, 0x2, 0x800, {"ee8146574bf9c99b1665691fc4baa5f4"}, 0x3, 0xff, 0x6}}}, 0x118) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r5 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r5) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x40, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4080}, 0x200000c0) (async) r6 = inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) r7 = syz_io_uring_complete(0x0) (rerun: 64) sendmsg$L2TP_CMD_NOOP(r7, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PPPIOCGFLAGS(r7, 0x8004745a, &(0x7f0000000680)) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) (async, rerun: 64) r8 = syz_io_uring_complete(0x0) (rerun: 64) sendmsg$L2TP_CMD_NOOP(r8, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) inotify_rm_watch(r8, r6) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r9 = syz_io_uring_complete(0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r9, &(0x7f0000000480)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r10, 0x40}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000004c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x1, 0x47, "6f87bf90af447d8bae2e58874b4f164a30109f980b8dc6dde008dbe6f83e6b720bc3ade05acbc2835c7701bc0efcf13b3571e0ef3c1696795fd1870805ccbb8fae6941843b7aab01772bd4e228e691a8e9d5276fd4144df019675dde547069d27d97beea29d975b88e046a48fe405afd2f65afdf2d4dccb96c34ff9a2837a126517593a0a2fe105373c8873186e0f4c9c913fd6b6188b0bcf797f0af3589b47d57183a74bd8e01b8dcd8e3c2e943a338be09b7f136dfa7dc92f3c8953ac01115ab5deb8ba7d64757e2571459f64fcea9c6911ae61c4f1e6f299b12c3c48f0f31ad2cffd9bdbd760e741d7f40296cc46afe6e2f326794313f3c8ba447027d8098", 0x6, 0x1, 0x8, 0xff, 0x8, 0x0, 0x2}, r11}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x100, 0x70bd27, 0x25dfdbfb, "", ["", ""]}, 0x10}}, 0x8000) (async) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) r4 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000007c0)={0x4, 0x80, 0x0, 0x1f, 0x5, 0xff, 0x0, 0x8, 0x3001c, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000003c0), 0xa}, 0x20, 0x7fff, 0x9, 0x7, 0x2, 0xd7b1, 0x5, 0x0, 0xfffffffc, 0x0, 0x9}) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/slabinfo\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x9, &(0x7f0000000140)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x36}, @call={0x85, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x16, '\x00', r3, 0x3, r5, 0x8, &(0x7f0000000240)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x2, 0xfffffff8, 0x1}, 0x10, r6, 0xffffffffffffffff, 0x7, &(0x7f0000000640)=[0x1], &(0x7f0000000680)=[{0x4, 0x3, 0x80007, 0xb}, {0x0, 0x3, 0x5, 0x7}, {0x4, 0x5, 0x10, 0x8}, {0x1, 0x5, 0x5, 0x4}, {0x5, 0x5, 0x10, 0x9}, {0x0, 0x1, 0xa, 0xc}, {0x2, 0x1, 0xc, 0x8}], 0x10, 0x8}, 0x90) (async) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) 01:24:25 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'dvmrp1\x00'}) syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x2f63, &(0x7f0000000080)={0x0, 0xdf45, 0x4, 0x3, 0x194}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, 0xffffffffffffff9c, &(0x7f0000000280)={0x115100, 0x4, 0x4}, &(0x7f00000002c0)='./file0\x00', 0x18, 0x0, 0x12345}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 5: syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x104, &(0x7f0000000500)=0xff, 0x0, 0x4) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) read$msr(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x10000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0xc0, 0x82, 0x1a, 0x5, 0x0, 0x6, 0x8, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x80000001}, 0x80010, 0x5, 0x0, 0x8, 0x6, 0x1, 0x8, 0x0, 0x7, 0x0, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 2: r0 = syz_io_uring_complete(0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x1f, 0x80, 0x6, 0x0, 0x4, 0x120, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x880, 0x5, 0x2, 0x9, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x7, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0xa}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x44c}, 0x1, 0x0, 0x0, 0x8081}, 0x834) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xe109}, 0x8) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) syz_io_uring_complete(0x0) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x1f, 0x80, 0x6, 0x0, 0x4, 0x120, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x880, 0x5, 0x2, 0x9, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0x7, 0xffffffffffffffff, 0x0) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0xa}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x44c}, 0x1, 0x0, 0x0, 0x8081}, 0x834) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xe109}, 0x8) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) (async) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:25 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'dvmrp1\x00'}) syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x2f63, &(0x7f0000000080)={0x0, 0xdf45, 0x4, 0x3, 0x194}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, 0xffffffffffffff9c, &(0x7f0000000280)={0x115100, 0x4, 0x4}, &(0x7f00000002c0)='./file0\x00', 0x18, 0x0, 0x12345}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'dvmrp1\x00'}) (async) syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300), 0x0) (async) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) (async) syz_io_uring_setup(0x2f63, &(0x7f0000000080)={0x0, 0xdf45, 0x4, 0x3, 0x194}, &(0x7f0000000100), &(0x7f0000000140)) (async) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, 0xffffffffffffff9c, &(0x7f0000000280)={0x115100, 0x4, 0x4}, &(0x7f00000002c0)='./file0\x00', 0x18, 0x0, 0x12345}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x10000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0xc0, 0x82, 0x1a, 0x5, 0x0, 0x6, 0x8, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x80000001}, 0x80010, 0x5, 0x0, 0x8, 0x6, 0x1, 0x8, 0x0, 0x7, 0x0, 0x1}) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x100, 0x70bd27, 0x25dfdbfb, "", ["", ""]}, 0x10}}, 0x8000) (async) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r4 = syz_io_uring_complete(0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000007c0)={0x4, 0x80, 0x0, 0x1f, 0x5, 0xff, 0x0, 0x8, 0x3001c, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f00000003c0), 0xa}, 0x20, 0x7fff, 0x9, 0x7, 0x2, 0xd7b1, 0x5, 0x0, 0xfffffffc, 0x0, 0x9}) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/slabinfo\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x9, &(0x7f0000000140)=@raw=[@btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x36}, @call={0x85, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x16, '\x00', r3, 0x3, r5, 0x8, &(0x7f0000000240)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x2, 0xfffffff8, 0x1}, 0x10, r6, 0xffffffffffffffff, 0x7, &(0x7f0000000640)=[0x1], &(0x7f0000000680)=[{0x4, 0x3, 0x80007, 0xb}, {0x0, 0x3, 0x5, 0x7}, {0x4, 0x5, 0x10, 0x8}, {0x1, 0x5, 0x5, 0x4}, {0x5, 0x5, 0x10, 0x9}, {0x0, 0x1, 0xa, 0xc}, {0x2, 0x1, 0xc, 0x8}], 0x10, 0x8}, 0x90) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:25 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'dvmrp1\x00'}) syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x2f63, &(0x7f0000000080)={0x0, 0xdf45, 0x4, 0x3, 0x194}, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000300)=@IORING_OP_OPENAT2={0x1c, 0x44, 0x0, 0xffffffffffffff9c, &(0x7f0000000280)={0x115100, 0x4, 0x4}, &(0x7f00000002c0)='./file0\x00', 0x18, 0x0, 0x12345}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) (async) read$msr(r2, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0xc5fb, 0x90802) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'macvlan1\x00'}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x30, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e01525c910c0933c6021386a00876404b00a154642c2979121a9cc333b9c4432d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba58ac16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e583077400"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) 01:24:25 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x10000) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x10000, 0x10000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0xc0, 0x82, 0x1a, 0x5, 0x0, 0x6, 0x8, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x80000001}, 0x80010, 0x5, 0x0, 0x8, 0x6, 0x1, 0x8, 0x0, 0x7, 0x0, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x5129, 0x0) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) (async) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x5129, 0x0) 01:24:25 executing program 2: syz_open_dev$vcsu(&(0x7f00000000c0), 0xc5fb, 0x90802) (async) r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0xc5fb, 0x90802) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'macvlan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'macvlan1\x00'}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x30, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e01525c910c0933c6021386a00876404b00a154642c2979121a9cc333b9c4432d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba58ac16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e583077400"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x0) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x2}}, 0x18) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x5129, 0x0) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0xc5fb, 0x90802) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'macvlan1\x00'}) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x30, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e01525c910c0933c6021386a00876404b00a154642c2979121a9cc333b9c4432d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba58ac16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e583077400"}}, 0x110) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) 01:24:25 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x0) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x2}}, 0x18) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 3: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002820}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) syz_open_dev$MSR(&(0x7f00000005c0), 0x1ff, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x9, 0xfffffffc, 0x3f, 0x6, 0x8, 0x800, 0x3, 0x4]) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x0) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x2}}, 0x18) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x18}, @ldst={0x3, 0x2, 0x1, 0x0, 0x4, 0x100}, @generic={0x98, 0xe, 0x0, 0x1f, 0x200}]}, &(0x7f0000000340)='GPL\x00', 0x1ff, 0x0, 0x0, 0x41100, 0x4e, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x7, 0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r0, r0, r0, r0, 0x1], 0x0, 0x10, 0x100}, 0x90) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000280)=0x4) 01:24:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x2, 0x4}}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r0, &(0x7f0000000100)=0x80, &(0x7f00000001c0)=@nfc, 0x0, 0x80800, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 3: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002820}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) (async, rerun: 64) syz_open_dev$MSR(&(0x7f00000005c0), 0x1ff, 0x0) (async, rerun: 64) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x9, 0xfffffffc, 0x3f, 0x6, 0x8, 0x800, 0x3, 0x4]) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x38) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000006c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x3f, 0x0, "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", 0x80, 0x9, 0x7, 0x1, 0xfa, 0x1, 0xfe, 0x1}, r8}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r6, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0xfffffffffffffe6a, 0xfa00, {r3, 0xcc9f}}, 0x10) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x7, "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", 0x8, 0x3, 0x28, 0x81, 0x1, 0x3, 0x0, 0x1}, r6}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x9, @mcast2, 0x61e}, {0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x80000000}, r1, 0x1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x8, 0xea6, "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", 0x81, 0x3f, 0x20, 0x2, 0x8, 0x4, 0x20}, r2}}, 0x120) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(0xffffffffffffffff, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x2, 0x4}}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r0, &(0x7f0000000100)=0x80, &(0x7f00000001c0)=@nfc, 0x0, 0x80800, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x2, 0x4}}, 0x20) (async) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r0, &(0x7f0000000100)=0x80, &(0x7f00000001c0)=@nfc, 0x0, 0x80800, 0x1}) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:25 executing program 3: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002820}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) syz_open_dev$MSR(&(0x7f00000005c0), 0x1ff, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x9, 0xfffffffc, 0x3f, 0x6, 0x8, 0x800, 0x3, 0x4]) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002820}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010102}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0x1ff, 0x0) (async) syz_open_dev$MSR(&(0x7f0000000000), 0x3, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000080)=[0x9, 0xfffffffc, 0x3f, 0x6, 0x8, 0x800, 0x3, 0x4]) (async) 01:24:25 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x18}, @ldst={0x3, 0x2, 0x1, 0x0, 0x4, 0x100}, @generic={0x98, 0xe, 0x0, 0x1f, 0x200}]}, &(0x7f0000000340)='GPL\x00', 0x1ff, 0x0, 0x0, 0x41100, 0x4e, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x7, 0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r0, r0, r0, r0, 0x1], 0x0, 0x10, 0x100}, 0x90) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000280)=0x4) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000280)=0x4) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x9, @mcast2, 0x61e}, {0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x80000000}, r1, 0x1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x8, 0xea6, "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", 0x81, 0x3f, 0x20, 0x2, 0x8, 0x4, 0x20}, r2}}, 0x120) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x38) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000006c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x3f, 0x0, "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", 0x80, 0x9, 0x7, 0x1, 0xfa, 0x1, 0xfe, 0x1}, r8}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r6, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0xfffffffffffffe6a, 0xfa00, {r3, 0xcc9f}}, 0x10) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x7, "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", 0x8, 0x3, 0x28, 0x81, 0x1, 0x3, 0x0, 0x1}, r6}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x38) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000006c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x3f, 0x0, "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", 0x80, 0x9, 0x7, 0x1, 0xfa, 0x1, 0xfe, 0x1}, r8}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r6, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0xfffffffffffffe6a, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x7, "54ff5a46988ce6a37b53a3299930a99025b50943edae71a0da4f4386664d3385f24bd23a2237a2db4c8aa95a0e1c73717bbbe79fc5f80ea41a0f67e6850635d83c630dd9bbbf76effb4c90ecbd63bba66ab0d5d511ac549a0d4498ba1150f2ab69937cf5cbbb9d249a739942c79b0ba5fa41ae42e6512e00ace022ecbe052659d9e9d0a42572bc8b36a75072f06474043dd03b61fc3249515c5785f770ce8234c3245d8b143d8435bde54fe67da23f4f0b274bf42a43af5cb57bdbb277961d7a6fc26d05a2d2e6828f0e0cdbe45fe941f419de373b249f28d5a2c9676e81b72208cd84df53081c57b0eb93e8c6ae186d714c5c9e98a96c91cdd7f0180916bcd9", 0x8, 0x3, 0x28, 0x81, 0x1, 0x3, 0x0, 0x1}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) (async) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x18}, @ldst={0x3, 0x2, 0x1, 0x0, 0x4, 0x100}, @generic={0x98, 0xe, 0x0, 0x1f, 0x200}]}, &(0x7f0000000340)='GPL\x00', 0x1ff, 0x0, 0x0, 0x41100, 0x4e, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x7, 0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r0, r0, r0, r0, 0x1], 0x0, 0x10, 0x100}, 0x90) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000280)=0x4) 01:24:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x2, 0x4}}, 0x20) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, r0, &(0x7f0000000100)=0x80, &(0x7f00000001c0)=@nfc, 0x0, 0x80800, 0x1}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x80000000, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x9, @mcast2, 0x61e}, {0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x80000000}, r1, 0x1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x8, 0xea6, "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", 0x81, 0x3f, 0x20, 0x2, 0x8, 0x4, 0x20}, r2}}, 0x120) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x80000000, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0xcd6c, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x38) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000006c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x3f, 0x0, "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", 0x80, 0x9, 0x7, 0x1, 0xfa, 0x1, 0xfe, 0x1}, r8}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r6, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0xfffffffffffffe6a, 0xfa00, {r3, 0xcc9f}}, 0x10) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x7, "54ff5a46988ce6a37b53a3299930a99025b50943edae71a0da4f4386664d3385f24bd23a2237a2db4c8aa95a0e1c73717bbbe79fc5f80ea41a0f67e6850635d83c630dd9bbbf76effb4c90ecbd63bba66ab0d5d511ac549a0d4498ba1150f2ab69937cf5cbbb9d249a739942c79b0ba5fa41ae42e6512e00ace022ecbe052659d9e9d0a42572bc8b36a75072f06474043dd03b61fc3249515c5785f770ce8234c3245d8b143d8435bde54fe67da23f4f0b274bf42a43af5cb57bdbb277961d7a6fc26d05a2d2e6828f0e0cdbe45fe941f419de373b249f28d5a2c9676e81b72208cd84df53081c57b0eb93e8c6ae186d714c5c9e98a96c91cdd7f0180916bcd9", 0x8, 0x3, 0x28, 0x81, 0x1, 0x3, 0x0, 0x1}, r6}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x38) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000006c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x3f, 0x0, "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", 0x80, 0x9, 0x7, 0x1, 0xfa, 0x1, 0xfe, 0x1}, r8}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r6, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0xfffffffffffffe6a, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0x7, "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", 0x8, 0x3, 0x28, 0x81, 0x1, 0x3, 0x0, 0x1}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r3}}, 0x18) (async) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8000000000000000}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008001}, 0x20008000) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$X86_IOC_RDMSR_REGS(r6, 0xc02063a0, &(0x7f0000000280)=[0x2, 0x6, 0x8, 0x7, 0xffffffff, 0xc92, 0x80000000, 0x8]) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffe, @mcast1}, r1}}, 0x30) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x80000000, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0xcd6c, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, 0x0, 0x0) read$msr(r0, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffe, @mcast1}, r1}}, 0x30) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8000000000000000}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008001}, 0x20008000) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$X86_IOC_RDMSR_REGS(r6, 0xc02063a0, &(0x7f0000000280)=[0x2, 0x6, 0x8, 0x7, 0xffffffff, 0xc92, 0x80000000, 0x8]) 01:24:25 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x2, 0x42) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xf, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@generic={0x8, 0x2, 0x0, 0x7f, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x5}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x36}, @exit, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x3, 0xa, 0x2, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xc, 0x0, 0x4, 0xffffffffffffffc0, 0xe5ada70ed088f88c}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000140)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x10, 0x4, 0xe046}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff], &(0x7f0000000240)=[{0x5, 0x2, 0xf, 0x8}, {0x3, 0x2, 0x1, 0xb}], 0x10, 0x5}, 0x90) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0xcd6c, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000000)={0x1, @le_set_data_len={{0x2022, 0x6}, {0xc9, 0x1, 0x9}}}, 0xa) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) bind$bt_hci(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0x6) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) (async, rerun: 32) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r4 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x2, 0x42) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xf, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@generic={0x8, 0x2, 0x0, 0x7f, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x5}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x36}, @exit, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x3, 0xa, 0x2, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xc, 0x0, 0x4, 0xffffffffffffffc0, 0xe5ada70ed088f88c}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000140)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x10, 0x4, 0xe046}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff], &(0x7f0000000240)=[{0x5, 0x2, 0xf, 0x8}, {0x3, 0x2, 0x1, 0xb}], 0x10, 0x5}, 0x90) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async, rerun: 64) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffe, @mcast1}, r1}}, 0x30) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8000000000000000}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008001}, 0x20008000) (async) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$X86_IOC_RDMSR_REGS(r6, 0xc02063a0, &(0x7f0000000280)=[0x2, 0x6, 0x8, 0x7, 0xffffffff, 0xc92, 0x80000000, 0x8]) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x0, 0xfa00, {0x0, r1, 0xfffffffd}}, 0xfffffda8) 01:24:25 executing program 3: r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r4 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x2, 0x42) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xf, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@generic={0x8, 0x2, 0x0, 0x7f, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x5}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x36}, @exit, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @ldst={0x3, 0x3, 0x3, 0xa, 0x2, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xc, 0x0, 0x4, 0xffffffffffffffc0, 0xe5ada70ed088f88c}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000140)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x10, 0x4, 0xe046}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000200)=[0xffffffffffffffff, r3, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff], &(0x7f0000000240)=[{0x5, 0x2, 0xf, 0x8}, {0x3, 0x2, 0x1, 0xb}], 0x10, 0x5}, 0x90) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000000)={0x1, @le_set_data_len={{0x2022, 0x6}, {0xc9, 0x1, 0x9}}}, 0xa) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) bind$bt_hci(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0x6) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/224, 0xe0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x4, 0x10, '\x00', 0xfe, 0x9}) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(0xffffffffffffffff, &(0x7f0000000000)=""/60, 0x3c) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x4, 0x10, '\x00', 0xfe, 0x9}) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, 0x0, 0x0) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/224, 0xe0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}}}, 0x30) 01:24:25 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x4, 0x10, '\x00', 0xfe, 0x9}) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={0x4, 0x10, '\x00', 0xfe, 0x9}) (async) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, 0x0, 0x0) 01:24:25 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x0, 0xfa00, {0x0, r1, 0xfffffffd}}, 0xfffffda8) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/224, 0xe0) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}}}, 0x30) (async) 01:24:25 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) read$msr(r0, 0x0, 0x0) 01:24:25 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) read$msr(r0, &(0x7f0000000000)=""/78, 0x4e) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r1, &(0x7f0000000000)={0x1, @le_set_data_len={{0x2022, 0x6}, {0xc9, 0x1, 0x9}}}, 0xa) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) bind$bt_hci(r0, &(0x7f00000000c0)={0x1f, 0x3}, 0x6) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000007c0), 0x3eb, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000006c0)={0x1, 0x10, 0xfa00, {&(0x7f00000004c0), r4}}, 0x18) r6 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x3b2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000780)={0xf, 0x8, 0xfa00, {r7, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r4, 0x1}}, 0x18) read$msr(r1, &(0x7f0000000080)=""/211, 0x127) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:25 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x0, 0xfa00, {0x0, r1, 0xfffffffd}}, 0xfffffda8) 01:24:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}}}, 0x30) 01:24:25 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) read$msr(r0, &(0x7f0000000000)=""/78, 0x4e) (async) read$msr(r0, &(0x7f0000000000)=""/78, 0x4e) 01:24:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x101}}, 0x10) 01:24:25 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000007c0), 0x3eb, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000006c0)={0x1, 0x10, 0xfa00, {&(0x7f00000004c0), r4}}, 0x18) r6 = syz_io_uring_complete(0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x3b2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000780)={0xf, 0x8, 0xfa00, {r7, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r4, 0x1}}, 0x18) (async) read$msr(r1, &(0x7f0000000080)=""/211, 0x127) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:26 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x0, 0xfa00, {0x0, r1, 0xfffffffd}}, 0xfffffda8) 01:24:26 executing program 3: r0 = syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) read$msr(r0, &(0x7f0000000000)=""/78, 0x4e) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000580), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r2, 0x6}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r8, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r4}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000300)={0x4, 0x8, 0xfa00, {r9, 0x8}}, 0x10) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) syz_open_dev$MSR(&(0x7f00000007c0), 0x3eb, 0x0) (async) r1 = syz_open_dev$MSR(&(0x7f00000007c0), 0x3eb, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000006c0)={0x1, 0x10, 0xfa00, {&(0x7f00000004c0), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f00000006c0)={0x1, 0x10, 0xfa00, {&(0x7f00000004c0), r4}}, 0x18) r6 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000700)={0xffffffffffffffff}, 0x3b2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000780)={0xf, 0x8, 0xfa00, {r7, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r4, 0x1}}, 0x18) read$msr(r1, &(0x7f0000000080)=""/211, 0x127) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async, rerun: 64) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000580), r2}}, 0x18) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) (async, rerun: 64) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r2, 0x6}}, 0x10) (async, rerun: 64) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r8, 0x0, 0x2, 0x4}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r4}}, 0x48) (rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000300)={0x4, 0x8, 0xfa00, {r9, 0x8}}, 0x10) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfc, {0x1, 0x1}, ["", "", "", ""]}, 0x18}}, 0x8001) read$msr(r0, &(0x7f0000000100)=""/160, 0xa0) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = shmget(0x2, 0x3000, 0x800, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/62) 01:24:26 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x101}}, 0x10) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfc, {0x1, 0x1}, ["", "", "", ""]}, 0x18}}, 0x8001) read$msr(r0, &(0x7f0000000100)=""/160, 0xa0) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = shmget(0x2, 0x3000, 0x800, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/62) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) shmget(0x2, 0x3000, 0x800, &(0x7f0000ffc000/0x3000)=nil) (async) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/62) (async) 01:24:26 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000580), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000580), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r2, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r8, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r4}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r4}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000300)={0x4, 0x8, 0xfa00, {r9, 0x8}}, 0x10) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x101}}, 0x10) 01:24:26 executing program 2: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x51}, 0x4042014) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc6f9792ab8040384}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4008805) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40040) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x101}}, 0x10) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x1, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 64) r1 = syz_io_uring_complete(0x0) (rerun: 64) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfc, {0x1, 0x1}, ["", "", "", ""]}, 0x18}}, 0x8001) (async) read$msr(r0, &(0x7f0000000100)=""/160, 0xa0) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = shmget(0x2, 0x3000, 0x800, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/62) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc6f9792ab8040384}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4008805) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40040) 01:24:26 executing program 2: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x51}, 0x4042014) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 3: r0 = getpgrp(0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x3e9, 0x2, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1, r0, 0x6, 0x80, 0x81, 0xdb1, 0x0, 0x627, 0x58240000}, ["", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r1 = socket(0xf877474071be5697, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0xfd, 0xb4c5, 0x1, @empty, @remote, 0x0, 0x7, 0x80, 0x7fe6}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x29, 0x9, 0x1, 0x3, 0x2, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x40, 0x6, 0x81}}) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x100085fb, 0xa0882) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 3: r0 = getpgrp(0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x3e9, 0x2, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1, r0, 0x6, 0x80, 0x81, 0xdb1, 0x0, 0x627, 0x58240000}, ["", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) (async) r1 = socket(0xf877474071be5697, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0xfd, 0xb4c5, 0x1, @empty, @remote, 0x0, 0x7, 0x80, 0x7fe6}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x29, 0x9, 0x1, 0x3, 0x2, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x40, 0x6, 0x81}}) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 2: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x51}, 0x4042014) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc6f9792ab8040384}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4008805) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40040) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc6f9792ab8040384}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4008805) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) socket$rds(0x15, 0x5, 0x0) (async) bind$rds(r5, &(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40040) (async) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_open_dev$vcsu(&(0x7f0000000280), 0x1, 0x400101) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) r3 = syz_io_uring_complete(0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000002c0)=r1) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$LOOP_CLR_FD(r1, 0x4c01) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r4 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000880)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8090, @mcast1, 0x80000000}}}, 0x90) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x100, 0x70bd26, 0x25dfdbfb, {0x2, 0x0, 0x6, [0x401, 0x6, 0x80000000, 0x27, 0x8, 0x9, 0x19, 0x8, 0x1f, 0x7fffffff, 0x7, 0x8, 0x7e8, 0x3, 0x9, 0x5, 0xff, 0x7c1da7f7, 0x5, 0x20, 0x9, 0xfffffffb, 0x7fff, 0x0, 0x480000, 0xffffff81, 0x800, 0x3, 0x8, 0x3, 0x4, 0x5, 0x1f1c, 0x2, 0x80000000, 0x5, 0x8, 0x1ff, 0x1f, 0x3, 0x0, 0x20, 0x2, 0x80, 0xc1d, 0x4, 0x48c1, 0x100, 0x100, 0x1, 0x3, 0xc4fc, 0xd2, 0x1, 0x0, 0x2, 0x7, 0x2, 0x3, 0x7, 0x8, 0x3, 0x5], [0x0, 0x3e25, 0x2, 0xc6, 0x81, 0x6, 0x10001, 0x20, 0x5e, 0x40, 0x6, 0x100, 0xe99, 0x46d2, 0xb09, 0x9, 0x2, 0xffffffe7, 0x401, 0x1, 0x8, 0x9, 0x9, 0xffffffff, 0xffff, 0x1, 0x8001, 0x7fff, 0x3, 0x60d, 0x3, 0x1, 0x6, 0x7, 0x1f, 0x81, 0x200, 0x6, 0x3, 0x0, 0xfffffffb, 0x6, 0x6c91b82d, 0x100, 0x7f, 0x4, 0x8, 0x9, 0x8000, 0x8, 0x99, 0x4, 0x7, 0x100, 0x9b1, 0x5, 0xff, 0x3, 0x26092e5b, 0x8, 0xff, 0x5, 0x9, 0x820], [0x4, 0x0, 0xfffffbff, 0x4, 0x7, 0x3, 0x2049, 0xfffffe01, 0x80, 0x1, 0x9e1, 0x6, 0x9, 0x13, 0x5, 0x7a3a, 0x80000000, 0x0, 0x800, 0x4, 0x101, 0xcbc4, 0x7b, 0x5, 0x8, 0x7f, 0x1000, 0x4, 0x80000000, 0x3, 0x1, 0x10000, 0xb1, 0x24e, 0x75c, 0x7fffffff, 0x2, 0x27, 0x7, 0x5, 0x1, 0x400, 0x6, 0x2, 0x7, 0x14, 0xff, 0x2, 0x189, 0x40, 0xffffff7f, 0x81, 0x389, 0x1, 0x0, 0x385e, 0x8, 0x8, 0xae, 0x5, 0x800, 0x3, 0x4], [0xfbc, 0x1f, 0xb6, 0x3130ff5c, 0x7f, 0x4, 0x6, 0x5, 0x0, 0x47422809, 0x5, 0xe31, 0x8, 0x56, 0x4, 0x764, 0xfffffffc, 0x2, 0x3, 0x8, 0x7fffffff, 0xfffffffa, 0x1ff, 0x8, 0x3f, 0x800, 0x6, 0x9, 0x80, 0x6, 0x3, 0xe24c, 0x3f, 0x8, 0x4, 0x0, 0x0, 0x65, 0xfffff801, 0xaf3a, 0x1, 0x80000000, 0xbce, 0x90, 0x8, 0x10000, 0x401, 0x20, 0x4, 0x2783, 0x7, 0x6, 0x738c44df, 0x10001, 0x9145, 0xffffff7f, 0x1cbf, 0x80000001, 0xdda4, 0x8, 0x7, 0x6, 0x2, 0x6], 0x16, ['%\'@&!./%\'T-!#\x00', 'pim6reg\x00']}, [""]}, 0x438}, 0x1, 0x0, 0x0, 0x1000}, 0x0) 01:24:26 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x100085fb, 0xa0882) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x100085fb, 0xa0882) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 2: syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) r1 = syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x77a1, &(0x7f00000003c0)={0x0, 0xf2d8, 0x400, 0x1, 0xb4, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000440)) r4 = syz_io_uring_complete(r3) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000480)) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf250000000006000e0009000000050006000300000002000f00142000000000000008000a000300000005000400070000000500210001000000050007007f00000006001b004e20000005000d0000000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x40004) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r4, r5, 0x0, r6}, 0x10) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 3: r0 = getpgrp(0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x3e9, 0x2, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1, 0x1, r0, 0x6, 0x80, 0x81, 0xdb1, 0x0, 0x627, 0x58240000}, ["", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r1 = socket(0xf877474071be5697, 0x0, 0x0) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0xfd, 0xb4c5, 0x1, @empty, @remote, 0x0, 0x7, 0x80, 0x7fe6}}) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x29, 0x9, 0x1, 0x3, 0x2, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x40, 0x6, 0x81}}) (async, rerun: 32) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (rerun: 32) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x100085fb, 0xa0882) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 2: syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) (async) r1 = syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x77a1, &(0x7f00000003c0)={0x0, 0xf2d8, 0x400, 0x1, 0xb4, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000440)) r4 = syz_io_uring_complete(r3) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000480)) (async) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 64) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) (rerun: 64) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf250000000006000e0009000000050006000300000002000f00142000000000000008000a000300000005000400070000000500210001000000050007007f00000006001b004e20000005000d0000000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x40004) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r4, r5, 0x0, r6}, 0x10) (async, rerun: 64) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xdfffffffffffffff, 0x0) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async, rerun: 64) r1 = syz_open_dev$vcsu(&(0x7f0000000280), 0x1, 0x400101) (async, rerun: 64) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) r3 = syz_io_uring_complete(0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000002c0)=r1) (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) (async) ioctl$LOOP_CLR_FD(r1, 0x4c01) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r4 = syz_io_uring_complete(0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000880)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8090, @mcast1, 0x80000000}}}, 0x90) (async, rerun: 32) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x100, 0x70bd26, 0x25dfdbfb, {0x2, 0x0, 0x6, [0x401, 0x6, 0x80000000, 0x27, 0x8, 0x9, 0x19, 0x8, 0x1f, 0x7fffffff, 0x7, 0x8, 0x7e8, 0x3, 0x9, 0x5, 0xff, 0x7c1da7f7, 0x5, 0x20, 0x9, 0xfffffffb, 0x7fff, 0x0, 0x480000, 0xffffff81, 0x800, 0x3, 0x8, 0x3, 0x4, 0x5, 0x1f1c, 0x2, 0x80000000, 0x5, 0x8, 0x1ff, 0x1f, 0x3, 0x0, 0x20, 0x2, 0x80, 0xc1d, 0x4, 0x48c1, 0x100, 0x100, 0x1, 0x3, 0xc4fc, 0xd2, 0x1, 0x0, 0x2, 0x7, 0x2, 0x3, 0x7, 0x8, 0x3, 0x5], [0x0, 0x3e25, 0x2, 0xc6, 0x81, 0x6, 0x10001, 0x20, 0x5e, 0x40, 0x6, 0x100, 0xe99, 0x46d2, 0xb09, 0x9, 0x2, 0xffffffe7, 0x401, 0x1, 0x8, 0x9, 0x9, 0xffffffff, 0xffff, 0x1, 0x8001, 0x7fff, 0x3, 0x60d, 0x3, 0x1, 0x6, 0x7, 0x1f, 0x81, 0x200, 0x6, 0x3, 0x0, 0xfffffffb, 0x6, 0x6c91b82d, 0x100, 0x7f, 0x4, 0x8, 0x9, 0x8000, 0x8, 0x99, 0x4, 0x7, 0x100, 0x9b1, 0x5, 0xff, 0x3, 0x26092e5b, 0x8, 0xff, 0x5, 0x9, 0x820], [0x4, 0x0, 0xfffffbff, 0x4, 0x7, 0x3, 0x2049, 0xfffffe01, 0x80, 0x1, 0x9e1, 0x6, 0x9, 0x13, 0x5, 0x7a3a, 0x80000000, 0x0, 0x800, 0x4, 0x101, 0xcbc4, 0x7b, 0x5, 0x8, 0x7f, 0x1000, 0x4, 0x80000000, 0x3, 0x1, 0x10000, 0xb1, 0x24e, 0x75c, 0x7fffffff, 0x2, 0x27, 0x7, 0x5, 0x1, 0x400, 0x6, 0x2, 0x7, 0x14, 0xff, 0x2, 0x189, 0x40, 0xffffff7f, 0x81, 0x389, 0x1, 0x0, 0x385e, 0x8, 0x8, 0xae, 0x5, 0x800, 0x3, 0x4], [0xfbc, 0x1f, 0xb6, 0x3130ff5c, 0x7f, 0x4, 0x6, 0x5, 0x0, 0x47422809, 0x5, 0xe31, 0x8, 0x56, 0x4, 0x764, 0xfffffffc, 0x2, 0x3, 0x8, 0x7fffffff, 0xfffffffa, 0x1ff, 0x8, 0x3f, 0x800, 0x6, 0x9, 0x80, 0x6, 0x3, 0xe24c, 0x3f, 0x8, 0x4, 0x0, 0x0, 0x65, 0xfffff801, 0xaf3a, 0x1, 0x80000000, 0xbce, 0x90, 0x8, 0x10000, 0x401, 0x20, 0x4, 0x2783, 0x7, 0x6, 0x738c44df, 0x10001, 0x9145, 0xffffff7f, 0x1cbf, 0x80000001, 0xdda4, 0x8, 0x7, 0x6, 0x2, 0x6], 0x16, ['%\'@&!./%\'T-!#\x00', 'pim6reg\x00']}, [""]}, 0x438}, 0x1, 0x0, 0x0, 0x1000}, 0x0) (rerun: 32) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xe7d}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r1 = socket$nl_audit(0x10, 0x3, 0x9) (rerun: 64) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xdfffffffffffffff, 0x0) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xe7d}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 2: syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) r1 = syz_io_uring_setup(0x14ba, &(0x7f0000000280)={0x0, 0x5e97, 0x4, 0x0, 0x1f9}, &(0x7f0000000300)=0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x0, @fd_index=0x5, 0x7, 0x2, 0x45dcdab8}) syz_io_uring_setup(0x77a1, &(0x7f00000003c0)={0x0, 0xf2d8, 0x400, 0x1, 0xb4, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000440)) syz_io_uring_complete(r3) (async) r4 = syz_io_uring_complete(r3) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000480)) (async) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000480)) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) r6 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf250000000006000e0009000000050006000300000002000f00142000000000000008000a000300000005000400070000000500210001000000050007007f00000006001b004e20000005000d0000000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x40004) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r4, r5, 0x0, r6}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r4, r5, 0x0, r6}, 0x10) r7 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r7, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) r1 = syz_open_dev$vcsu(&(0x7f0000000280), 0x1, 0x400101) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) r3 = syz_io_uring_complete(0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000002c0)=r1) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$LOOP_CLR_FD(r1, 0x4c01) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r4 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000880)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8090, @mcast1, 0x80000000}}}, 0x90) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x100, 0x70bd26, 0x25dfdbfb, {0x2, 0x0, 0x6, [0x401, 0x6, 0x80000000, 0x27, 0x8, 0x9, 0x19, 0x8, 0x1f, 0x7fffffff, 0x7, 0x8, 0x7e8, 0x3, 0x9, 0x5, 0xff, 0x7c1da7f7, 0x5, 0x20, 0x9, 0xfffffffb, 0x7fff, 0x0, 0x480000, 0xffffff81, 0x800, 0x3, 0x8, 0x3, 0x4, 0x5, 0x1f1c, 0x2, 0x80000000, 0x5, 0x8, 0x1ff, 0x1f, 0x3, 0x0, 0x20, 0x2, 0x80, 0xc1d, 0x4, 0x48c1, 0x100, 0x100, 0x1, 0x3, 0xc4fc, 0xd2, 0x1, 0x0, 0x2, 0x7, 0x2, 0x3, 0x7, 0x8, 0x3, 0x5], [0x0, 0x3e25, 0x2, 0xc6, 0x81, 0x6, 0x10001, 0x20, 0x5e, 0x40, 0x6, 0x100, 0xe99, 0x46d2, 0xb09, 0x9, 0x2, 0xffffffe7, 0x401, 0x1, 0x8, 0x9, 0x9, 0xffffffff, 0xffff, 0x1, 0x8001, 0x7fff, 0x3, 0x60d, 0x3, 0x1, 0x6, 0x7, 0x1f, 0x81, 0x200, 0x6, 0x3, 0x0, 0xfffffffb, 0x6, 0x6c91b82d, 0x100, 0x7f, 0x4, 0x8, 0x9, 0x8000, 0x8, 0x99, 0x4, 0x7, 0x100, 0x9b1, 0x5, 0xff, 0x3, 0x26092e5b, 0x8, 0xff, 0x5, 0x9, 0x820], [0x4, 0x0, 0xfffffbff, 0x4, 0x7, 0x3, 0x2049, 0xfffffe01, 0x80, 0x1, 0x9e1, 0x6, 0x9, 0x13, 0x5, 0x7a3a, 0x80000000, 0x0, 0x800, 0x4, 0x101, 0xcbc4, 0x7b, 0x5, 0x8, 0x7f, 0x1000, 0x4, 0x80000000, 0x3, 0x1, 0x10000, 0xb1, 0x24e, 0x75c, 0x7fffffff, 0x2, 0x27, 0x7, 0x5, 0x1, 0x400, 0x6, 0x2, 0x7, 0x14, 0xff, 0x2, 0x189, 0x40, 0xffffff7f, 0x81, 0x389, 0x1, 0x0, 0x385e, 0x8, 0x8, 0xae, 0x5, 0x800, 0x3, 0x4], [0xfbc, 0x1f, 0xb6, 0x3130ff5c, 0x7f, 0x4, 0x6, 0x5, 0x0, 0x47422809, 0x5, 0xe31, 0x8, 0x56, 0x4, 0x764, 0xfffffffc, 0x2, 0x3, 0x8, 0x7fffffff, 0xfffffffa, 0x1ff, 0x8, 0x3f, 0x800, 0x6, 0x9, 0x80, 0x6, 0x3, 0xe24c, 0x3f, 0x8, 0x4, 0x0, 0x0, 0x65, 0xfffff801, 0xaf3a, 0x1, 0x80000000, 0xbce, 0x90, 0x8, 0x10000, 0x401, 0x20, 0x4, 0x2783, 0x7, 0x6, 0x738c44df, 0x10001, 0x9145, 0xffffff7f, 0x1cbf, 0x80000001, 0xdda4, 0x8, 0x7, 0x6, 0x2, 0x6], 0x16, ['%\'@&!./%\'T-!#\x00', 'pim6reg\x00']}, [""]}, 0x438}, 0x1, 0x0, 0x0, 0x1000}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) syz_open_dev$vcsu(&(0x7f0000000280), 0x1, 0x400101) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) syz_io_uring_complete(0x0) (async) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000002c0)=r1) (async) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) (async) ioctl$LOOP_CLR_FD(r1, 0x4c01) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) syz_io_uring_complete(0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000880)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8090, @mcast1, 0x80000000}}}, 0x90) (async) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000007c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x438, 0x3f4, 0x100, 0x70bd26, 0x25dfdbfb, {0x2, 0x0, 0x6, [0x401, 0x6, 0x80000000, 0x27, 0x8, 0x9, 0x19, 0x8, 0x1f, 0x7fffffff, 0x7, 0x8, 0x7e8, 0x3, 0x9, 0x5, 0xff, 0x7c1da7f7, 0x5, 0x20, 0x9, 0xfffffffb, 0x7fff, 0x0, 0x480000, 0xffffff81, 0x800, 0x3, 0x8, 0x3, 0x4, 0x5, 0x1f1c, 0x2, 0x80000000, 0x5, 0x8, 0x1ff, 0x1f, 0x3, 0x0, 0x20, 0x2, 0x80, 0xc1d, 0x4, 0x48c1, 0x100, 0x100, 0x1, 0x3, 0xc4fc, 0xd2, 0x1, 0x0, 0x2, 0x7, 0x2, 0x3, 0x7, 0x8, 0x3, 0x5], [0x0, 0x3e25, 0x2, 0xc6, 0x81, 0x6, 0x10001, 0x20, 0x5e, 0x40, 0x6, 0x100, 0xe99, 0x46d2, 0xb09, 0x9, 0x2, 0xffffffe7, 0x401, 0x1, 0x8, 0x9, 0x9, 0xffffffff, 0xffff, 0x1, 0x8001, 0x7fff, 0x3, 0x60d, 0x3, 0x1, 0x6, 0x7, 0x1f, 0x81, 0x200, 0x6, 0x3, 0x0, 0xfffffffb, 0x6, 0x6c91b82d, 0x100, 0x7f, 0x4, 0x8, 0x9, 0x8000, 0x8, 0x99, 0x4, 0x7, 0x100, 0x9b1, 0x5, 0xff, 0x3, 0x26092e5b, 0x8, 0xff, 0x5, 0x9, 0x820], [0x4, 0x0, 0xfffffbff, 0x4, 0x7, 0x3, 0x2049, 0xfffffe01, 0x80, 0x1, 0x9e1, 0x6, 0x9, 0x13, 0x5, 0x7a3a, 0x80000000, 0x0, 0x800, 0x4, 0x101, 0xcbc4, 0x7b, 0x5, 0x8, 0x7f, 0x1000, 0x4, 0x80000000, 0x3, 0x1, 0x10000, 0xb1, 0x24e, 0x75c, 0x7fffffff, 0x2, 0x27, 0x7, 0x5, 0x1, 0x400, 0x6, 0x2, 0x7, 0x14, 0xff, 0x2, 0x189, 0x40, 0xffffff7f, 0x81, 0x389, 0x1, 0x0, 0x385e, 0x8, 0x8, 0xae, 0x5, 0x800, 0x3, 0x4], [0xfbc, 0x1f, 0xb6, 0x3130ff5c, 0x7f, 0x4, 0x6, 0x5, 0x0, 0x47422809, 0x5, 0xe31, 0x8, 0x56, 0x4, 0x764, 0xfffffffc, 0x2, 0x3, 0x8, 0x7fffffff, 0xfffffffa, 0x1ff, 0x8, 0x3f, 0x800, 0x6, 0x9, 0x80, 0x6, 0x3, 0xe24c, 0x3f, 0x8, 0x4, 0x0, 0x0, 0x65, 0xfffff801, 0xaf3a, 0x1, 0x80000000, 0xbce, 0x90, 0x8, 0x10000, 0x401, 0x20, 0x4, 0x2783, 0x7, 0x6, 0x738c44df, 0x10001, 0x9145, 0xffffff7f, 0x1cbf, 0x80000001, 0xdda4, 0x8, 0x7, 0x6, 0x2, 0x6], 0x16, ['%\'@&!./%\'T-!#\x00', 'pim6reg\x00']}, [""]}, 0x438}, 0x1, 0x0, 0x0, 0x1000}, 0x0) (async) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xe7d}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xdfffffffffffffff, 0x0) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @remote, 0x6}, {0xa, 0x4e22, 0x1, @local, 0x9}, r1, 0x7}}, 0x48) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, r5}}, 0x18) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xd3f, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, @ib={0x1b, 0x5, 0x5, {"abd9f895ef3dba8fb7f68aa2186455b0"}, 0x6, 0xffff, 0xd7b7}}}, 0x118) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r5, 0xfffffff7}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x610101) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x989, 0x3, "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", 0x9, 0x6, 0x54, 0x8, 0x2, 0x7, 0xe7}}}, 0x128) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x6c000000, 0x12885736, 0x1f, 0xffffef9c, 0x0, 0xffffffff, 0x7f, 0xffff]) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:26 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @remote, 0x6}, {0xa, 0x4e22, 0x1, @local, 0x9}, r1, 0x7}}, 0x48) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async, rerun: 32) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, r5}}, 0x18) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x610101) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x989, 0x3, "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", 0x9, 0x6, 0x54, 0x8, 0x2, 0x7, 0xe7}}}, 0x128) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) (async) syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x610101) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x989, 0x3, "2300c888aa60b9b91f8394b29a90408061c4121ce2a6131904ad12f12517b84cf5795ff1db30f14fbbbf29e1286484b03c7547171b5c115d3d8232be12bcc1d3cd9239e4e1be508ad95f30de71691eeecb17b64e7b7cfd4ee541780b1e7d16ccf828682c6bf1a90fe3125a579375e024d8dc2768e2e59f8a006762cf6c1cf8784b6503a77d2acc395e3ef4464291d2d6a0c493b1f1a2090834e923d1496ccf4d58e9f09b4c5fa5e88a199e9c4b3901073495db60dcb800983ba07131f778d53179e8d9734d5790b91b8cd2513ff71e699b551cf1f1da0beae21cc7289ba3976c5053939c0ad4105ea0cc0a55036a90a0995e20c84a7b95eaca4d51c9073fac7d", 0x9, 0x6, 0x54, 0x8, 0x2, 0x7, 0xe7}}}, 0x128) (async) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xd3f, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, @ib={0x1b, 0x5, 0x5, {"abd9f895ef3dba8fb7f68aa2186455b0"}, 0x6, 0xffff, 0xd7b7}}}, 0x118) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r5, 0xfffffff7}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) syz_io_uring_complete(0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xd3f, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, @ib={0x1b, 0x5, 0x5, {"abd9f895ef3dba8fb7f68aa2186455b0"}, 0x6, 0xffff, 0xd7b7}}}, 0x118) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r5, 0xfffffff7}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:26 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r2, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r1, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @remote, 0x6}, {0xa, 0x4e22, 0x1, @local, 0x9}, r1, 0x7}}, 0x48) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r3 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, r5}}, 0x18) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0x0, 0x0) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x610101) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x989, 0x3, "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", 0x9, 0x6, 0x54, 0x8, 0x2, 0x7, 0xe7}}}, 0x128) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) (async) syz_open_dev$vcsu(&(0x7f0000000040), 0x7, 0x610101) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x989, 0x3, "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", 0x9, 0x6, 0x54, 0x8, 0x2, 0x7, 0xe7}}}, 0x128) (async) 01:24:26 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x6c000000, 0x12885736, 0x1f, 0xffffef9c, 0x0, 0xffffffff, 0x7f, 0xffff]) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xd3f, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, @ib={0x1b, 0x5, 0x5, {"abd9f895ef3dba8fb7f68aa2186455b0"}, 0x6, 0xffff, 0xd7b7}}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0xd3f, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, @ib={0x1b, 0x5, 0x5, {"abd9f895ef3dba8fb7f68aa2186455b0"}, 0x6, 0xffff, 0xd7b7}}}, 0x118) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r5, 0xfffffff7}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x6, 0x0) 01:24:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9837, 0x2, {"a987a5db12789aa24774d296a6461d3c"}, 0x3, 0x7, 0x9}}}, 0x90) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x6c000000, 0x12885736, 0x1f, 0xffffef9c, 0x0, 0xffffffff, 0x7f, 0xffff]) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 01:24:26 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r0}}, 0x48) 01:24:26 executing program 2: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x7c, 0x0, 0x4, 0x70bd2b, 0x25dedbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x43}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_DOMAIN={0xf, 0x1, '/dev/vcsu#\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x14}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20000000) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9837, 0x2, {"a987a5db12789aa24774d296a6461d3c"}, 0x3, 0x7, 0x9}}}, 0x90) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x6, 0x0) 01:24:26 executing program 2: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x7c, 0x0, 0x4, 0x70bd2b, 0x25dedbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x43}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_DOMAIN={0xf, 0x1, '/dev/vcsu#\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x14}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20000000) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @ib={0x1b, 0x9837, 0x2, {"a987a5db12789aa24774d296a6461d3c"}, 0x3, 0x7, 0x9}}}, 0x90) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async, rerun: 64) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) 01:24:26 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r0}}, 0x48) 01:24:26 executing program 2: sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x7c, 0x0, 0x4, 0x70bd2b, 0x25dedbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x43}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_DOMAIN={0xf, 0x1, '/dev/vcsu#\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x14}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20000000) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x7c, 0x0, 0x4, 0x70bd2b, 0x25dedbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x43}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010100}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_DOMAIN={0xf, 0x1, '/dev/vcsu#\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x14}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2000c001}, 0x20000000) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:26 executing program 1: r0 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400), 0x111, 0x6}}, 0x20) read$msr(r1, &(0x7f0000000080)=""/211, 0xd3) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "de5561", "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"}}, 0x110) read$msr(r1, &(0x7f0000000180)=""/201, 0xfdef) r2 = syz_open_dev$vcsu(&(0x7f00000004c0), 0xffff, 0x501) r3 = shmget(0x1, 0x4000, 0x54000010, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x4, "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", 0x3, 0xa9, 0x2, 0x5, 0x81, 0x1, 0x70}, r5}}, 0x128) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480)={0x0, r1}, 0x10) 01:24:26 executing program 3: syz_open_dev$MSR(&(0x7f0000000000), 0x6, 0x0) syz_open_dev$MSR(&(0x7f0000000000), 0x6, 0x0) (async) 01:24:26 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r0}}, 0x48) 01:24:26 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:26 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @local}}}, 0xa0) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000cc0)) syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x1) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000340)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x5) 01:24:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:26 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @local}}}, 0xa0) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000cc0)) syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x1) (async) syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x1) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000340)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x5) (async) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x5) 01:24:26 executing program 1: r0 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400), 0x111, 0x6}}, 0x20) read$msr(r1, &(0x7f0000000080)=""/211, 0xd3) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "de5561", "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"}}, 0x110) read$msr(r1, &(0x7f0000000180)=""/201, 0xfdef) r2 = syz_open_dev$vcsu(&(0x7f00000004c0), 0xffff, 0x501) r3 = shmget(0x1, 0x4000, 0x54000010, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x4, "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", 0x3, 0xa9, 0x2, 0x5, 0x81, 0x1, 0x70}, r5}}, 0x128) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480)={0x0, r1}, 0x10) shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) (async) shmctl$SHM_LOCK(r0, 0xb) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400), 0x111, 0x6}}, 0x20) (async) read$msr(r1, &(0x7f0000000080)=""/211, 0xd3) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "de5561", "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"}}, 0x110) (async) read$msr(r1, &(0x7f0000000180)=""/201, 0xfdef) (async) syz_open_dev$vcsu(&(0x7f00000004c0), 0xffff, 0x501) (async) shmget(0x1, 0x4000, 0x54000010, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$IPC_RMID(r3, 0x0) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x4, "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", 0x3, 0xa9, 0x2, 0x5, 0x81, 0x1, 0x70}, r5}}, 0x128) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r1}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480)={0x0, r1}, 0x10) (async) 01:24:26 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x0, "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", 0xff, 0x0, 0xa0, 0x0, 0x1, 0x9, 0x8c}, r1}}, 0x128) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000401, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) [ 1523.659087][ T2768] ================================================================== [ 1523.667208][ T2768] BUG: KCSAN: data-race in kernfs_iop_permission / kernfs_link_sibling [ 1523.675469][ T2768] [ 1523.677802][ T2768] read-write to 0xffff88811daef0c0 of 8 bytes by task 15000 on cpu 0: [ 1523.685948][ T2768] kernfs_link_sibling+0x1e7/0x230 [ 1523.691088][ T2768] kernfs_add_one+0x260/0x390 [ 1523.695770][ T2768] kernfs_create_dir_ns+0x100/0x150 [ 1523.700972][ T2768] sysfs_create_dir_ns+0xd7/0x1d0 [ 1523.706011][ T2768] kobject_add_internal+0x47b/0x780 [ 1523.711215][ T2768] kobject_add+0xdc/0x150 [ 1523.715568][ T2768] device_add+0x2ff/0xab0 [ 1523.719896][ T2768] rfkill_register+0x140/0x500 [ 1523.724661][ T2768] nfc_register_device+0x101/0x190 [ 1523.729780][ T2768] nci_register_device+0x4e6/0x570 [ 1523.734891][ T2768] virtual_ncidev_open+0xdc/0x140 [ 1523.739916][ T2768] misc_open+0x203/0x240 [ 1523.744160][ T2768] chrdev_open+0x34f/0x3c0 [ 1523.748581][ T2768] do_dentry_open+0x5c3/0xae0 [ 1523.753266][ T2768] vfs_open+0x4a/0x50 [ 1523.757254][ T2768] path_openat+0x17f2/0x1d10 [ 1523.761850][ T2768] do_filp_open+0xf6/0x200 [ 1523.766274][ T2768] do_sys_openat2+0xab/0x110 [ 1523.770870][ T2768] __x64_sys_openat+0xf3/0x120 [ 1523.775663][ T2768] do_syscall_64+0x41/0xc0 [ 1523.780084][ T2768] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1523.785990][ T2768] [ 1523.788308][ T2768] read to 0xffff88811daef0c0 of 8 bytes by task 2768 on cpu 1: [ 1523.795844][ T2768] kernfs_iop_permission+0x18a/0x1e0 [ 1523.801137][ T2768] inode_permission+0x184/0x300 [ 1523.806019][ T2768] link_path_walk+0x19e/0x7e0 [ 1523.810699][ T2768] path_openat+0x1a1/0x1d10 [ 1523.815202][ T2768] do_filp_open+0xf6/0x200 [ 1523.819621][ T2768] do_sys_openat2+0xab/0x110 [ 1523.824229][ T2768] __x64_sys_openat+0xf3/0x120 [ 1523.829001][ T2768] do_syscall_64+0x41/0xc0 [ 1523.833427][ T2768] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1523.839352][ T2768] [ 1523.841668][ T2768] value changed: 0x0000000000000001 -> 0x0000000000000002 [ 1523.848771][ T2768] [ 1523.851086][ T2768] Reported by Kernel Concurrency Sanitizer on: [ 1523.857227][ T2768] CPU: 1 PID: 2768 Comm: udevd Not tainted 6.5.0-syzkaller-00453-g727dbda16b83 #0 [ 1523.866435][ T2768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1523.876494][ T2768] ================================================================== 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) socket(0x29, 0x2, 0x400) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) (async) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @local}}}, 0xa0) (async, rerun: 64) r1 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) (async, rerun: 64) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) r2 = syz_open_dev$loop(&(0x7f0000000c80), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000cc0)) (async, rerun: 64) syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x1) (async, rerun: 64) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000340)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x5) 01:24:27 executing program 1: r0 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400), 0x111, 0x6}}, 0x20) read$msr(r1, &(0x7f0000000080)=""/211, 0xd3) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "de5561", "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"}}, 0x110) read$msr(r1, &(0x7f0000000180)=""/201, 0xfdef) r2 = syz_open_dev$vcsu(&(0x7f00000004c0), 0xffff, 0x501) r3 = shmget(0x1, 0x4000, 0x54000010, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x4, "0daf1ae30a9da6a57029e3b78b8e893b9c53a3227519b039da1a81c6f770f4b424ca2469ae70ae957363d6191b2acd1c57d3440d7ed9a87657b36fc42074033f07b848258efad87f43f9c28ddb3aae3c41cb9ec84d2494661be2aae8e35665c8aacacd2b1a7861716cffe77362714aee162f042705677657ef675ffdf44fda8c816dab4bcb425663ca9f84df0a97ffef84c5e78cb7707deb74186646a1168ccea4623c2315a5c03bc797eff9b97978f36892ff9c81bb327fc68d38a45b086bed370aea2fb798b6d687d7f03eac82dd61e51261baf8d21a9066c20aa559d559ca8a140c1b4b5b821bda2569a274b092b9308449af47675e3f9f38b96800bc69fb", 0x3, 0xa9, 0x2, 0x5, 0x81, 0x1, 0x70}, r5}}, 0x128) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480)={0x0, r1}, 0x10) shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) (async) shmctl$SHM_LOCK(r0, 0xb) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400), 0x111, 0x6}}, 0x20) (async) read$msr(r1, &(0x7f0000000080)=""/211, 0xd3) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x9, "de5561", "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"}}, 0x110) (async) read$msr(r1, &(0x7f0000000180)=""/201, 0xfdef) (async) syz_open_dev$vcsu(&(0x7f00000004c0), 0xffff, 0x501) (async) shmget(0x1, 0x4000, 0x54000010, &(0x7f0000ff9000/0x4000)=nil) (async) shmctl$IPC_RMID(r3, 0x0) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x4, "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", 0x3, 0xa9, 0x2, 0x5, 0x81, 0x1, 0x70}, r5}}, 0x128) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r1}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000480)={0x0, r1}, 0x10) (async) 01:24:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x0, "e24853339dd1d076632bcd4265499979908d733db2f155ca340e4adc5d7f117cbb75872017016dd507d6a6bf9c19b01290ad0017defdbb3f9075046bea4c63d2b4dec0c9f95663c7b549f5507da9596f0385b96283dd24630e3cd936508ce463a18a0634c857e7f4e13ec1ef786f4c6d78537d4768ef1076ecbd6c21a1b5cba494a043d39a2f0f88ef4260f7e30360c0640acd5b8398f2d6c5b52802588de3d9a28d498460d37a3ae2e7ee739243bf12f4e2775a7caaf59ec59030f2a95331bcd30d34b75e166cb4d8ee616480738cb49041a5b3423305f3ce965fc81fe62db65170e1dec46ae816636f6863b5e4631fb196e3d47aeaf19b05724fadff3def61", 0xff, 0x0, 0xa0, 0x0, 0x1, 0x9, 0x8c}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x0, "e24853339dd1d076632bcd4265499979908d733db2f155ca340e4adc5d7f117cbb75872017016dd507d6a6bf9c19b01290ad0017defdbb3f9075046bea4c63d2b4dec0c9f95663c7b549f5507da9596f0385b96283dd24630e3cd936508ce463a18a0634c857e7f4e13ec1ef786f4c6d78537d4768ef1076ecbd6c21a1b5cba494a043d39a2f0f88ef4260f7e30360c0640acd5b8398f2d6c5b52802588de3d9a28d498460d37a3ae2e7ee739243bf12f4e2775a7caaf59ec59030f2a95331bcd30d34b75e166cb4d8ee616480738cb49041a5b3423305f3ce965fc81fe62db65170e1dec46ae816636f6863b5e4631fb196e3d47aeaf19b05724fadff3def61", 0xff, 0x0, 0xa0, 0x0, 0x1, 0x9, 0x8c}, r1}}, 0x128) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000401, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f9, 0x284000) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfa}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400c040}, 0x1) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x4, {0xff, 0x0, "e24853339dd1d076632bcd4265499979908d733db2f155ca340e4adc5d7f117cbb75872017016dd507d6a6bf9c19b01290ad0017defdbb3f9075046bea4c63d2b4dec0c9f95663c7b549f5507da9596f0385b96283dd24630e3cd936508ce463a18a0634c857e7f4e13ec1ef786f4c6d78537d4768ef1076ecbd6c21a1b5cba494a043d39a2f0f88ef4260f7e30360c0640acd5b8398f2d6c5b52802588de3d9a28d498460d37a3ae2e7ee739243bf12f4e2775a7caaf59ec59030f2a95331bcd30d34b75e166cb4d8ee616480738cb49041a5b3423305f3ce965fc81fe62db65170e1dec46ae816636f6863b5e4631fb196e3d47aeaf19b05724fadff3def61", 0xff, 0x0, 0xa0, 0x0, 0x1, 0x9, 0x8c}, r1}}, 0x128) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000401, 0x0) (async) syz_open_dev$MSR(&(0x7f0000000000), 0x8000000000401, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) (async) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000000)) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f9, 0x284000) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfa}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400c040}, 0x1) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfa}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400c040}, 0x1) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) syz_open_dev$MSR(&(0x7f0000000200), 0x8001, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x300, 0x7, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044014}, 0x20004004) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:27 executing program 4: r0 = syz_io_uring_complete(0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:27 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2}}, 0x18) 01:24:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/38, 0x26) r2 = socket(0x5, 0x80000, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x40}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0xc14}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x200}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000000) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85f9, 0x284000) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfa}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400c040}, 0x1) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85f9, 0x284000) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfa}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400c040}, 0x1) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:27 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) r0 = syz_io_uring_complete(0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) (async) syz_open_dev$MSR(&(0x7f0000000200), 0x8001, 0x0) (async, rerun: 32) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x300, 0x7, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044014}, 0x20004004) (rerun: 32) 01:24:27 executing program 4: r0 = syz_io_uring_complete(0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) (async) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) 01:24:27 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2}}, 0x18) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_io_uring_complete(0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @remote}}}, 0x90) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:27 executing program 0: syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0, r2}}, 0x18) (rerun: 64) 01:24:27 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) syz_open_dev$MSR(&(0x7f0000000200), 0x8001, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x300, 0x7, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044014}, 0x20004004) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_io_uring_complete(0x0) (async) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) (async) syz_open_dev$MSR(&(0x7f0000000200), 0x8001, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x300, 0x7, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044014}, 0x20004004) (async) 01:24:27 executing program 4: r0 = syz_io_uring_complete(0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) syz_io_uring_complete(0x0) (async) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r2}}, 0x30) (async) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/38, 0x26) (async) r2 = socket(0x5, 0x80000, 0x0) (async) r3 = socket(0x10, 0x2, 0x0) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x40}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0xc14}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x200}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000000) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_io_uring_complete(0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @remote}}}, 0x90) 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x20000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000040)={0x2, "5990"}, 0x3) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_io_uring_complete(0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @remote}}}, 0x90) 01:24:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8001, 0x1, 0x1, 0x2001, 0xffffffffffffffff, 0x5, '\x00', r1, 0xffffffffffffffff, 0x0, 0x5}, 0x48) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$msr(r1, &(0x7f0000000280)=""/38, 0x26) (async) r2 = socket(0x5, 0x80000, 0x0) (async) r3 = socket(0x10, 0x2, 0x0) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r4, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x40}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0xc14}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x200}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000000) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = socket(0x29, 0x2, 0x400) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000040)={0x2, "5990"}, 0x3) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) syz_io_uring_complete(0x0) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0xffffffffffffffff) syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x20000) (async) r3 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x20000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8001, 0x1, 0x1, 0x2001, 0xffffffffffffffff, 0x5, '\x00', r1, 0xffffffffffffffff, 0x0, 0x5}, 0x48) (async) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x20000) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0xca15, 0x20002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8001, 0x1, 0x1, 0x2001, 0xffffffffffffffff, 0x5, '\x00', r1, 0xffffffffffffffff, 0x0, 0x5}, 0x48) (async, rerun: 64) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000340)) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0xa26, 0x70bd26, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4021058}, 0x8000) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x22002, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0xca15, 0x20002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = socket(0x29, 0x2, 0x400) (async, rerun: 64) r2 = socket(0x29, 0x2, 0x400) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000040)={0x2, "5990"}, 0x3) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r1) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 32) r4 = syz_io_uring_complete(0x0) (rerun: 32) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) (async) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000340)) (async, rerun: 64) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0xa26, 0x70bd26, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4021058}, 0x8000) (rerun: 64) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x22002, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}}}, 0x48) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xd3c0302228befb11}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0x1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000480)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x4, @remote, 0x8}, r5}}, 0x30) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xd3c0302228befb11}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0x1}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000480)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x4, @remote, 0x8}, r5}}, 0x30) 01:24:27 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0xca15, 0x20002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000040)=[0x87e, 0xf13, 0x2, 0x7, 0x6, 0x5, 0x401, 0xfff]) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r5}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x39e3e46c1d18b2ea}, 0x42010) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000240)=0x80000000, 0x4) read$msr(r0, &(0x7f0000000080)=""/236, 0xec) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r6}, 0x18) 01:24:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x22002, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) 01:24:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async, rerun: 64) socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000340)) (async) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f2, 0xa26, 0x70bd26, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4021058}, 0x8000) (async, rerun: 32) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (rerun: 32) 01:24:27 executing program 2: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:27 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xd3c0302228befb11}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r2, 0x1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000480)={0xf, 0x8, 0xfa00, {r4, 0xd}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x4, @remote, 0x8}, r5}}, 0x30) 01:24:27 executing program 2: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 01:24:27 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000040)=[0x87e, 0xf13, 0x2, 0x7, 0x6, 0x5, 0x401, 0xfff]) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r4 = socket(0x10, 0x2, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r5}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x39e3e46c1d18b2ea}, 0x42010) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000240)=0x80000000, 0x4) read$msr(r0, &(0x7f0000000080)=""/236, 0xec) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r6}, 0x18) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000040)=[0x87e, 0xf13, 0x2, 0x7, 0x6, 0x5, 0x401, 0xfff]) (async) socket(0x29, 0x2, 0x400) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) socket(0x10, 0x2, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r5}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x39e3e46c1d18b2ea}, 0x42010) (async) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000240)=0x80000000, 0x4) (async) read$msr(r0, &(0x7f0000000080)=""/236, 0xec) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r6}, 0x18) (async) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x2b, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x1b) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x3}}}, 0x90) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xdb0, 0x3, "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", 0x8, 0xca, 0x7, 0xbd, 0x9, 0x5, 0x3}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x13f, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000580)={0xb, 0x10, 0xfa00, {&(0x7f0000000440), r5, 0x3}}, 0x18) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7ff, 0xfffffffc, 0xfffff236, 0xfffffffd, 0x6, 0x8, 0x7, 0x7]) r1 = syz_open_dev$vcsu(&(0x7f0000000180), 0x5, 0x40c800) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r1, r2, 0x4, r0}, 0x10) 01:24:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3, 0x8001}}, 0x3) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x453, 0x2, 0x70bd26, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000860}, 0x20004004) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$AUDIT_TTY_SET(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, 0x3f9, 0x200, 0x70bd2d, 0x25dfdbfe, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40090}, 0x4000800) 01:24:28 executing program 2: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) 01:24:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x2b, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x1b) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x3}}}, 0x90) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xdb0, 0x3, "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", 0x8, 0xca, 0x7, 0xbd, 0x9, 0x5, 0x3}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x13f, 0x1}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000580)={0xb, 0x10, 0xfa00, {&(0x7f0000000440), r5, 0x3}}, 0x18) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7ff, 0xfffffffc, 0xfffff236, 0xfffffffd, 0x6, 0x8, 0x7, 0x7]) r1 = syz_open_dev$vcsu(&(0x7f0000000180), 0x5, 0x40c800) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r1, r2, 0x4, r0}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7ff, 0xfffffffc, 0xfffff236, 0xfffffffd, 0x6, 0x8, 0x7, 0x7]) (async) syz_open_dev$vcsu(&(0x7f0000000180), 0x5, 0x40c800) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r1, r2, 0x4, r0}, 0x10) (async) 01:24:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3, 0x8001}}, 0x3) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x453, 0x2, 0x70bd26, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000860}, 0x20004004) (async) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$AUDIT_TTY_SET(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, 0x3f9, 0x200, 0x70bd2d, 0x25dfdbfe, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40090}, 0x4000800) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x2b, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x1b) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x2b, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x1b) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x3}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xdb0, 0x3, "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", 0x8, 0xca, 0x7, 0xbd, 0x9, 0x5, 0x3}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x13f, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x13f, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r4 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) (async) inotify_add_watch(r6, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r5, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000580)={0xb, 0x10, 0xfa00, {&(0x7f0000000440), r5, 0x3}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000580)={0xb, 0x10, 0xfa00, {&(0x7f0000000440), r5, 0x3}}, 0x18) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) ioctl$X86_IOC_RDMSR_REGS(r0, 0xc02063a0, &(0x7f0000000000)=[0x7ff, 0xfffffffc, 0xfffff236, 0xfffffffd, 0x6, 0x8, 0x7, 0x7]) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000180), 0x5, 0x40c800) (async) r2 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r1, r2, 0x4, r0}, 0x10) 01:24:28 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000040)=[0x87e, 0xf13, 0x2, 0x7, 0x6, 0x5, 0x401, 0xfff]) (async) r2 = socket(0x29, 0x2, 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a00), r2) (async) r3 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) r4 = socket(0x10, 0x2, 0x0) (async) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r5}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x39e3e46c1d18b2ea}, 0x42010) (async) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000240)=0x80000000, 0x4) (async) read$msr(r0, &(0x7f0000000080)=""/236, 0xec) (async) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000013c0)={'pim6reg\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x4000, r6}, 0x18) 01:24:28 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0xc0003) syz_open_dev$vcsu(&(0x7f0000000040), 0x5, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/stat\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff86, 0xfa00, {0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000280)='./file0\x00', 0x1000000) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) r9 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private2, 0x5}, r7}}, 0x30) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r3}}, 0x18) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x3c, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010101}}}, 0xa0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r4, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r3, 0xcc9f}}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3, 0x8001}}, 0x3) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x453, 0x2, 0x70bd26, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000860}, 0x20004004) (async) r5 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$AUDIT_TTY_SET(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, 0x3f9, 0x200, 0x70bd2d, 0x25dfdbfe, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40090}, 0x4000800) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1, 0x2}, r1, 0x7}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1, 0x6}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x2, "00b750", "db3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e583077400"}}, 0xb2) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x1}}, 0x10) r6 = syz_open_dev$vcsu(&(0x7f0000000100), 0x40, 0x4a01) r7 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r9, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r9, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r8, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r8, 0xfff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x566, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6}, @ib={0x1b, 0x7, 0x7, {"02624f13774b2d7bc80960d5a69b20c5"}, 0xedaa, 0xffffffff, 0x6}}}, 0x118) 01:24:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) 01:24:28 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0xc0003) syz_open_dev$vcsu(&(0x7f0000000040), 0x5, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) (async, rerun: 32) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async, rerun: 64) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (rerun: 64) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/stat\x00', 0x0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff86, 0xfa00, {0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000280)='./file0\x00', 0x1000000) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) r9 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private2, 0x5}, r7}}, 0x30) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r3}}, 0x18) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r3 = syz_open_dev$vcsu(&(0x7f0000000480), 0x7f, 0x101000) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf57, 0x0, 0x0, 0x0, 0xacc}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x4, 0x3c, &(0x7f00000002c0)=""/60, 0x41100, 0x54, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x8, 0x1f, 0x8e6}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000380)=[{0x4, 0x3, 0x4, 0xc}, {0x4, 0x4, 0x3, 0x7}, {0x4, 0x5, 0x9}], 0x10, 0xa4dc}, 0x90) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x3c, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010101}}}, 0xa0) (async, rerun: 32) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1, 0x2}, r1, 0x7}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1, 0x6}, r1}}, 0x30) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x2, "00b750", "db3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e583077400"}}, 0xb2) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x1}}, 0x10) r6 = syz_open_dev$vcsu(&(0x7f0000000100), 0x40, 0x4a01) (async) r7 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "90a9df40acde6160f0750fe4d6f56adb3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e5830774"}}, 0x110) (async) inotify_add_watch(r9, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r9, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r8, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r8, 0xfff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x566, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6}, @ib={0x1b, 0x7, 0x7, {"02624f13774b2d7bc80960d5a69b20c5"}, 0xedaa, 0xffffffff, 0x6}}}, 0x118) 01:24:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) (async) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r3 = syz_open_dev$vcsu(&(0x7f0000000480), 0x7f, 0x101000) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf57, 0x0, 0x0, 0x0, 0xacc}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x4, 0x3c, &(0x7f00000002c0)=""/60, 0x41100, 0x54, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x8, 0x1f, 0x8e6}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000380)=[{0x4, 0x3, 0x4, 0xc}, {0x4, 0x4, 0x3, 0x7}, {0x4, 0x5, 0x9}], 0x10, 0xa4dc}, 0x90) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'wg2\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) syz_open_dev$vcsu(&(0x7f0000000480), 0x7f, 0x101000) (async) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf57, 0x0, 0x0, 0x0, 0xacc}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x4, 0x3c, &(0x7f00000002c0)=""/60, 0x41100, 0x54, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x8, 0x1f, 0x8e6}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000380)=[{0x4, 0x3, 0x4, 0xc}, {0x4, 0x4, 0x3, 0x7}, {0x4, 0x5, 0x9}], 0x10, 0xa4dc}, 0x90) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) 01:24:28 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x3c, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010101}}}, 0xa0) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x0, 0xc0003) syz_open_dev$vcsu(&(0x7f0000000040), 0x5, 0x800) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) (async, rerun: 32) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async, rerun: 32) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/stat\x00', 0x0, 0x0) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0xffffffffffffff86, 0xfa00, {0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000280)='./file0\x00', 0x1000000) r6 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r8, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r7, 0xcc9f}}, 0x10) (async) r9 = syz_io_uring_complete(0x0) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @private2, 0x5}, r7}}, 0x30) (async, rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r3}}, 0x18) (rerun: 64) 01:24:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1, 0x2}, r1, 0x7}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1, 0x6}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x2, "00b750", "db3dbf2ffcb629e7d2a62b6db7fcd570d26ae093cdd2147d987f4437677b8efa25a0ee2ce68d6d3aa8da772a98f1c062f19a15d6c35009a0274c02cb6d560706278e50e78b955937cbe9782fa8fd12ad6eed25c74eef231dada1496602997e87974d766b9507fb637053bc87e015253a0b2e4281c7c910c0933c6021388a96876404b00a154642c2979121a9cc333b9c44323296d06ddb4dc82366c6727a46d9a232767d567739aed4f9b9d4b1540b19d64c676f0eb8280c868711d5ce812b18d799a48d8a2d63a3b1447dbba576c16b45bc17d7f1c30fcb048d99ff4990c3796c752a4134c8060fa696a8a388e583077400"}}, 0xb2) (async) inotify_add_watch(r5, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r4, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x1}}, 0x10) (async) r6 = syz_open_dev$vcsu(&(0x7f0000000100), 0x40, 0x4a01) r7 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) (async) inotify_add_watch(r9, &(0x7f0000000900)='./file0\x00', 0x80) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r9, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r8, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r8, 0xfff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x566, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6}, @ib={0x1b, 0x7, 0x7, {"02624f13774b2d7bc80960d5a69b20c5"}, 0xedaa, 0xffffffff, 0x6}}}, 0x118) 01:24:28 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080), 0x85fb, 0x80002) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) (async) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) (async) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000013c0)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000001140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) r3 = syz_open_dev$vcsu(&(0x7f0000000480), 0x7f, 0x101000) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) r4 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf57, 0x0, 0x0, 0x0, 0xacc}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x4, 0x3c, &(0x7f00000002c0)=""/60, 0x41100, 0x54, '\x00', r2, 0x25, r4, 0x8, &(0x7f0000000300)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x8, 0x1f, 0x8e6}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000380)=[{0x4, 0x3, 0x4, 0xc}, {0x4, 0x4, 0x3, 0x7}, {0x4, 0x5, 0x9}], 0x10, 0xa4dc}, 0x90) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) select(0x40, &(0x7f0000000000)={0x2, 0xb15, 0x100, 0x5, 0x5, 0x4, 0x1, 0x9}, &(0x7f0000000040)={0x8001, 0x100000000, 0x2, 0x5, 0xffff, 0xfffffffffffffffc, 0x9, 0x9}, &(0x7f0000000080)={0x8000000000000000, 0x100000000, 0x5, 0x2, 0x1bc000000000000, 0x4, 0x34000000000000, 0x8}, &(0x7f00000000c0)={0x77359400}) 01:24:28 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x84401) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r2, 0xc}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r6}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) syz_io_uring_setup(0x26ec, &(0x7f0000000040)={0x0, 0x77aa, 0x20, 0x1, 0x297, 0x0, r0}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_io_uring_setup(0x4c5d, &(0x7f00000001c0)={0x0, 0x16e3, 0x1, 0x2, 0x103}, &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000280)=@IORING_OP_MADVISE={0x19, 0x38, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xb}) 01:24:28 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r0}}, 0x30) 01:24:28 executing program 0: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x8, 0x8, 0x0, 0x0, 0x9, 0xc0491, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x80000, 0x20, 0x200, 0x4, 0x6, 0x100, 0x4, 0x0, 0x7, 0x0, 0x5da0}, 0x0, 0x9, r1, 0x3) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) select(0x40, &(0x7f0000000000)={0x2, 0xb15, 0x100, 0x5, 0x5, 0x4, 0x1, 0x9}, &(0x7f0000000040)={0x8001, 0x100000000, 0x2, 0x5, 0xffff, 0xfffffffffffffffc, 0x9, 0x9}, &(0x7f0000000080)={0x8000000000000000, 0x100000000, 0x5, 0x2, 0x1bc000000000000, 0x4, 0x34000000000000, 0x8}, &(0x7f00000000c0)={0x77359400}) (async) select(0x40, &(0x7f0000000000)={0x2, 0xb15, 0x100, 0x5, 0x5, 0x4, 0x1, 0x9}, &(0x7f0000000040)={0x8001, 0x100000000, 0x2, 0x5, 0xffff, 0xfffffffffffffffc, 0x9, 0x9}, &(0x7f0000000080)={0x8000000000000000, 0x100000000, 0x5, 0x2, 0x1bc000000000000, 0x4, 0x34000000000000, 0x8}, &(0x7f00000000c0)={0x77359400}) 01:24:28 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r0}}, 0x30) 01:24:28 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x84401) (async, rerun: 32) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r3, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r2, 0xcc9f}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r2, 0xc}}, 0x10) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x13f}}, 0x20) (async) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "00b750", "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"}}, 0x110) inotify_add_watch(r7, &(0x7f0000000900)='./file0\x00', 0x80) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000a00)={0x4, 0x8, 0xfa00, {r6, 0xcc9f}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r6}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) syz_io_uring_setup(0x26ec, &(0x7f0000000040)={0x0, 0x77aa, 0x20, 0x1, 0x297, 0x0, r0}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) (rerun: 32) syz_io_uring_setup(0x4c5d, &(0x7f00000001c0)={0x0, 0x16e3, 0x1, 0x2, 0x103}, &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000280)=@IORING_OP_MADVISE={0x19, 0x38, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xb}) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 3: syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) select(0x40, &(0x7f0000000000)={0x2, 0xb15, 0x100, 0x5, 0x5, 0x4, 0x1, 0x9}, &(0x7f0000000040)={0x8001, 0x100000000, 0x2, 0x5, 0xffff, 0xfffffffffffffffc, 0x9, 0x9}, &(0x7f0000000080)={0x8000000000000000, 0x100000000, 0x5, 0x2, 0x1bc000000000000, 0x4, 0x34000000000000, 0x8}, &(0x7f00000000c0)={0x77359400}) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (async) syz_io_uring_complete(0x0) (async) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) (async) select(0x40, &(0x7f0000000000)={0x2, 0xb15, 0x100, 0x5, 0x5, 0x4, 0x1, 0x9}, &(0x7f0000000040)={0x8001, 0x100000000, 0x2, 0x5, 0xffff, 0xfffffffffffffffc, 0x9, 0x9}, &(0x7f0000000080)={0x8000000000000000, 0x100000000, 0x5, 0x2, 0x1bc000000000000, 0x4, 0x34000000000000, 0x8}, &(0x7f00000000c0)={0x77359400}) (async) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x8, 0x8, 0x0, 0x0, 0x9, 0xc0491, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x80000, 0x20, 0x200, 0x4, 0x6, 0x100, 0x4, 0x0, 0x7, 0x0, 0x5da0}, 0x0, 0x9, r1, 0x3) (rerun: 64) 01:24:28 executing program 0: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (rerun: 32) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r0}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}, r0}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1}, r0}}, 0x30) (async) 01:24:28 executing program 3: bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) 01:24:28 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) read$msr(r0, &(0x7f0000000080)=""/211, 0xd3) read$msr(r0, &(0x7f0000000180)=""/201, 0xfdef) (async) r1 = syz_io_uring_complete(0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x8, 0x8, 0x0, 0x0, 0x9, 0xc0491, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x80000, 0x20, 0x200, 0x4, 0x6, 0x100, 0x4, 0x0, 0x7, 0x0, 0x5da0}, 0x0, 0x9, r1, 0x3) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private1}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @mcast2, 0xb}, {0xa, 0x4e22, 0x1, @empty, 0x2}, r1}}, 0x48) 01:24:28 executing program 0: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) 01:24:28 executing program 3: bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) (async, rerun: 64) syz_open_dev$MSR(&(0x7f00000005c0), 0xffffffffffffffff, 0x0) (rerun: 64) 01:24:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_