EAM_CMD_NOOP(r2, &(0x7f0000002180)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002140)={&(0x7f0000000780)={0xfffffffffffffe95, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [{{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{}, {}, {0x0, 0x4, 0x781}}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0xfffffffffffffd90}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x13, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @mcast_rejoin_interval={{}, {}, {0x0, 0x4, 0x1}}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:21:55 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f00000000c0)={0x2b, "27a2d372ea0b6b2ada7fdebf30f40850b1e66ce727846875ff434951bc2b278d25c082d51693b4abc15686aa2a6fa18d61195f01af4dc8fa22f522524cee8c05f3acbd8c47ea54ce61ce242971be73900e70fe17e14d881765fb9f6de4d8ac692f4f8bffec934aeadb4179acbe0b02fe01ebd48f06bd17efdf6d5c19716dab72"}) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4040000) bind$x25(r0, &(0x7f0000000080)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:21:55 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000240)={0x0, 0x400, 0x3}) accept$netrom(r0, 0x0, 0x0) get_thread_area(&(0x7f0000000000)={0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x7, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0xe}, 0xa0, 0x80, 0x3, 0x200}}) get_thread_area(&(0x7f0000000200)={0x0, 0x100000, 0x4000, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000280)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', r2, 0x29, 0x0, 0x9a, 0x7, 0x2d, @private1={0xfc, 0x1, '\x00', 0x1}, @private1, 0x10, 0x7800, 0x9, 0x7f}}) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f00000001c0)) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 12:21:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:21:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f00000001c0)) 12:21:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:21:56 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) sendto$x25(r0, &(0x7f0000000040)="6a814f386e4e4f2bb0214e990406ea46d38471c639bf36d013a27311da1c72224e1c2d277dacd3dcca7101abd37bb3dc4488f7aeb1d282c581da2405fc8895b876b16cdaa02dc37ff6be2203be8c3e7eaaaf030e4b555ad392cfcf545822b3f0749846cf65fa303ff1f06e3fe5804104c56a62223115b25d11f00fc31d378ffa3920e71dd13f34e3988e1b552ab35e", 0x8f, 0x24002014, &(0x7f0000000100), 0x12) 12:21:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @mcast2, 0x7}, r5}}, 0x30) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x3, {0x8000, 0x0, "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", 0x82, 0x81, 0x8, 0x1, 0xfe, 0x4, 0x81, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@netrom, @rose, @null, @null, @netrom, @netrom, @null, @null]}, &(0x7f0000000080)=0x48) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept4(r1, &(0x7f0000000380)=@pppoe, &(0x7f0000000400)=0x80, 0x0) accept$netrom(r2, &(0x7f0000000440)={{0x3, @rose}, [@bcast, @rose, @remote, @netrom, @rose, @default, @bcast, @bcast]}, &(0x7f00000004c0)=0x48) connect$x25(r1, &(0x7f0000000740), 0x12) accept$netrom(r1, 0x0, 0x0) 12:21:56 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x1090c0, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000080)=0xffffffffffffffff, 0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0xa}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x5421, &(0x7f00000001c0)) 12:21:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r5, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r5}, 0x78) fcntl$getown(r6, 0x9) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000140)={r8, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1}}, 0xffc4) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r9, 0x0, 0x2, 0x4}}, 0x20) syz_open_dev$sndmidi(&(0x7f00000000c0), 0x5, 0x436000) 12:21:56 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000040)={0x0, 0x20}) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) fcntl$getown(r0, 0x9) 12:21:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000), 0x3ff, 0x20400) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x14bc43, 0x0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x4, 0x4) 12:21:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x200, 0x2a, "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", 0x80, 0x1, 0x2, 0x2, 0x20, 0x6, 0xfb}, r4}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x5450, &(0x7f00000001c0)) 12:21:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) fcntl$getown(r1, 0x9) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x2, @local, 0x3f}}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r5, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r5}, 0x78) fcntl$getown(r6, 0x9) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000140)={r8, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1}}, 0xffc4) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r9, 0x0, 0x2, 0x4}}, 0x20) syz_open_dev$sndmidi(&(0x7f00000000c0), 0x5, 0x436000) 12:21:56 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = accept$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{}, [@default, @remote, @rose, @rose, @remote, @default, @null]}, &(0x7f0000000140)=0x48) accept4(r0, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80800) accept$netrom(r1, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 12:21:56 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f00000002c0)=0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) r2 = accept4$x25(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x12, 0x800) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$sysctl(r3, &(0x7f0000000280)='3\x00', 0x2) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x8}}, 0x18) 12:21:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x240100, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x140f, 0x20, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x40040000}, 0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f0000000180)={0x5, 0x1, 0x8001, 0x80, 0x3, 0x9, 0xc, "c7219b02e98b79ce09d49f0695554fe9047419b9", "24902889cf7f7ff19e9afea671fc2fd19a880e62"}) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x5451, &(0x7f00000001c0)) 12:21:56 executing program 4: ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000000)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x44}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:56 executing program 3: r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_macvtap\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x40) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) 12:21:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) syz_init_net_socket$ax25(0x3, 0x5, 0xcd) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 12:21:56 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0x4, 'veth1\x00'}) connect$x25(r1, &(0x7f0000000740), 0x12) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x400, 0xffff}) fcntl$getown(r1, 0x9) sendto$x25(r1, &(0x7f0000000140)="24df", 0x2, 0x1, &(0x7f0000000180), 0x12) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300), 0x185880, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000380)={0x79, "0b374cb69052637c8ad24684e61140ff01b5f2351c645370edcc50f090f54940970e5a03b829e57271abbb82cdb5cb220521402e344f676b9f7da8e96b9f96492c12f72fa502fe79f2b06bfb6a640b302d0b7fd7ac844c9685a1986c4709af8def143c18c8e55a3023ab5c474b0aedabad754c14e0295cdc9add2cce4894a8e1"}) connect$x25(r3, &(0x7f0000000340), 0x12) bind$x25(r0, &(0x7f0000000000), 0x20000012) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$SIOCX25GSUBSCRIP(r5, 0x89e0, &(0x7f0000000440)={'bond0\x00', 0x8000, 0xffff}) 12:21:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r5, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r5}, 0x78) fcntl$getown(r6, 0x9) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000140)={r8, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1}}, 0xffc4) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r9, 0x0, 0x2, 0x4}}, 0x20) syz_open_dev$sndmidi(&(0x7f00000000c0), 0x5, 0x436000) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x5452, &(0x7f00000001c0)) 12:21:56 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="e6823a20ef412f6818da6b175a5e82c3af1db32e6718ba1d1fca2e8062731b13d7841f66a0f14ee4ecb7", 0x2a, 0x8000, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@null, 0x0, 'batadv_slave_1\x00'}) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x5460, &(0x7f00000001c0)) 12:21:56 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) recvmsg$can_bcm(r2, &(0x7f0000003800)={&(0x7f00000004c0)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000003780)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000540)=""/212, 0xd4}, {&(0x7f0000000640)=""/13, 0xd}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000000680)=""/1, 0x1}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/33, 0x21}], 0x7, &(0x7f0000000700)=""/62, 0x3e}, 0x2001) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e23, 0x5, @mcast1, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:56 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) socket$inet_udp(0x2, 0x2, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:21:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$getown(r1, 0x9) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0x3ff, 0xff, "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", 0x3f, 0xe8, 0x1, 0xff, 0xf9, 0x8}, r4}}, 0x120) 12:21:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r5, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r5}, 0x78) fcntl$getown(r6, 0x9) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000140)={r8, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1}}, 0xffc4) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r9, 0x0, 0x2, 0x4}}, 0x20) 12:21:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24010000", @ANYRES16=0x0, @ANYBLOB="000228bd7000fedbdf250800000006001a004e22000008001700", @ANYRES32, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) 12:21:56 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x6364, &(0x7f00000001c0)) 12:21:57 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:21:57 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000400)={@null, 0x2, 'veth1_to_bond\x00'}) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x10, 0x80, "a758f70b364d150bfb159e371541d8cddabf382391040000ecddfa3ee629adc3a7073bc2b4938cdad60ed69d05f41c26fd8ef8a9885b326466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36d09007b81786e20a0446fa434eb72cc3aa46c6df8a430df60e54508bfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb2976df11cf6678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692b4f92450837d09aeb5ebc0f7de9866bfb00", 0x0, 0x3, 0x0, 0x1, 0x20, 0x0, 0x0, 0x2}, r3}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000000040)={0x1f, 0x9}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) 12:21:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r4}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r4, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r4}, 0x78) fcntl$getown(r5, 0x9) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r4, 0x40187542, &(0x7f0000000140)={r7, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1}}, 0xffc4) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x120) 12:21:57 executing program 4: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8901, &(0x7f00000001c0)) 12:21:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) socketpair(0xb, 0x1, 0x7, &(0x7f0000000040)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f00000000c0)={0x0, 0x2, [{r2, 0x0, 0xfffffffff0000000, 0xfffffffff0000000}, {r1, 0x0, 0x1000000, 0x100000000}]}) connect$x25(r2, &(0x7f0000000740), 0x12) socketpair(0x22, 0xa, 0x1dc1, &(0x7f0000000080)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:21:57 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000040)={0x6a, "51e25de4a3df0485cf870cdf43ad8588cef077abd99d11e1ef5d9f1a457202096155bf209fae5551a83b0d9fbc5c8f1284f5de269ecf8dad88fff6ab390b5917c6b7baedea93c01ddfe62864cdbc2a1f079b7ed214191a66aa183c4257200b0f0bfb908d91696f347548eef5633efd1bcd9350fc5c10e04e9125219991fb5087"}) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:21:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='disconnect aa:aa:aa:aa:aa:11 2', 0x1e) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000380)=[{0x1d, 0x0, [0x0, 0x6, 0x10000, 0x10000, 0xfffffb9d, 0xb4e, 0x6, 0x9, 0x40, 0x5, 0x2, 0xdc0, 0x101, 0xffffffff, 0x7, 0xfd]}, {0x0, 0x0, [0x64, 0x8, 0x61fc, 0x99d, 0x2, 0x8000, 0x2, 0x4, 0x7, 0x20005, 0x8001, 0x80, 0x352, 0x2, 0xd7a8, 0x7]}, {0x0, 0x0, [0x4, 0x5b, 0x9, 0x5, 0x1000, 0x9, 0x8522, 0xff, 0x5, 0x80000000, 0x8, 0x0, 0x7, 0x5, 0xfff, 0xa80]}, {0x0, 0x0, [0xffff, 0x80000001, 0x7c000, 0x80, 0x800, 0xd9, 0xf, 0x800, 0x4, 0x20, 0x8, 0x101, 0x1, 0xa0000, 0xffffffe0]}, {0x4, 0x0, [0x5, 0x5, 0x2, 0x7fffffff, 0x10000, 0x5, 0xffff706f, 0x9, 0x1, 0x3, 0x0, 0x40, 0xf449, 0x10000, 0x7, 0x8]}, {0x18, 0x0, [0x10000, 0x7, 0x9605, 0x6, 0x1, 0x0, 0x4, 0x1, 0xb26, 0x9, 0x800, 0x101, 0x4, 0xfffff001, 0x101, 0x9]}], r7, 0x1, 0x1, 0x1b0}}, 0x20) 12:21:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000140)={r6, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106, 0x1}}, 0xffc4) 12:21:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8902, &(0x7f00000001c0)) 12:21:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r7, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000001c0)=0x1, r8, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0x4, 0x9dc, "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", 0xe0, 0x0, 0x81, 0x95, 0x8, 0x1f, 0x0, 0x1}, r4}}, 0x120) 12:21:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x8c00}, 0x4000804) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000040)={0x31, 0xbe6, 0x4, 0x6, 0x4}) 12:21:57 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000040), 0x12) 12:21:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r5}}, 0x18) 12:21:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8903, &(0x7f00000001c0)) 12:21:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000140)={r5, 0x1, 0x1000000000000, 0x8000}) 12:21:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3658, 0x8000, {"d65977bc43dc17e3ec55f72aa0d1dcd9"}, 0x6, 0xddd5, 0xf}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x5, "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", 0x40, 0x0, 0x5, 0x1, 0x6, 0x3, 0x5}}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r2, 0x88, "e27771", "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"}}, 0x110) 12:21:57 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x4100, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000000), 0x20000012) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 12:21:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x140a, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20004084) 12:21:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8904, &(0x7f00000001c0)) 12:21:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x64) 12:21:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) 12:21:57 executing program 3: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x10001, 0x5, "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", 0x7f, 0x4, 0x6d, 0x6, 0x3, 0x2, 0x6, 0x1}}}, 0x120) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0), 0x4, r6, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x6, @loopback, 0x3}}}, 0xa0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x4, 0x3, 0x8, 0x4, 0x48, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, 0x8, 0x4478b4698dbd9d75, 0xa099, 0x9}}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000180), r2, 0x0, 0x2, 0x4}}, 0x20) accept$netrom(r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340), 0x111, 0x3}}, 0x20) 12:21:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8906, &(0x7f00000001c0)) 12:21:57 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fcntl$getown(r1, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}}}, 0xa0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) bind$802154_dgram(r2, &(0x7f0000000040)={0x24, @none={0x0, 0x2}}, 0x14) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r4) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00012cbd7000fedbdf25050000001400080076657468305f766972745f776966690006001b004e2000000c0016000600000000000000060003000600000005000700030000000500140006000000052857b7d12b1300120001000000"], 0x5c}, 0x1, 0x0, 0x0, 0xc8c2}, 0x24004041) 12:21:57 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000180), 0x2) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000200), 0x12) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000001c0)={r1, 0x0, 0x10000, 0x2000}) socketpair(0x15, 0x3, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000040)=0x2, 0x4) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r1) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0x20, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x29, 0x8, 0x8b, 0x8, 0x10, @dev={0xfe, 0x80, '\x00', 0x1a}, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x8, 0x7, 0x4, 0x7fff}}) connect$can_j1939(r5, &(0x7f00000004c0)={0x1d, r6, 0x2, {0x1, 0x1}, 0xfe}, 0x18) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}]}, 0x24}, 0x1, 0x0, 0x0, 0x42084}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x490200, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x4, 0xe4, 0x81, 0x10000, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, @loopback, 0x7, 0x7800, 0xfffffffe, 0xadca}}) 12:21:57 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) 12:21:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:21:57 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8907, &(0x7f00000001c0)) 12:21:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:21:57 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) connect$x25(r3, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), 0x4) 12:21:58 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000140)={0xfffa, 0x7fff, 0x9, 0x6, 0x3a, 0x14, 0x21, "c6135c3f0479b21bafead381a6813ca48543b54a", "cf73c19493612f1f8bf1916d88f8570e6b914f07"}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) accept$netrom(r1, 0x0, 0x0) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@null, @default, @remote, @bcast, @default, @rose, @bcast, @null]}, &(0x7f00000000c0)=0x48) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000100)=0x3, 0x4) 12:21:58 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90000800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0xc0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 12:21:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 12:21:58 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x16, 0x5, "bfb65023b17b544a433f906643f64daa1f0000000239cc31ea0e08cad64edde5a6bf62b0791ba70800caf603ed012e0ebb201afeb1000400", "5b700b3e0438a24c9e02ff1d2a60ecfa3de170921c1dd01f27c7b8f9c824d0d43f89867ef828676537e93c12cd96d0ab0efe6f908c8807b5793c915c0081dca7", "e52cc756204d397f54e9d7050ddb0e87c7f89b396de519233f2f65da0f6cb30f", [0xcd, 0xfffffffffffffffc]}) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = accept4$ax25(r1, 0x0, &(0x7f00000004c0), 0x80800) accept4(r2, 0x0, &(0x7f0000000500), 0x80800) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r1) 12:21:58 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x890b, &(0x7f00000001c0)) 12:21:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) fork() r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c586104", @ANYRES16=r1, @ANYBLOB="000427bd03000000df250220000008000b0004008000"], 0x1c}}, 0x0) r4 = accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f00000001c0)=0x12, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000180)) 12:21:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r3, 0x0, 0x1, 0x4}}, 0x20) 12:21:58 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x10102, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000001c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:58 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x890c, &(0x7f00000001c0)) 12:21:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) 12:21:58 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x80080000000) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000040)={0x401, 0x401, 0x5, 0x4, 0x8, 0x10, 0x1d, "13032637e43a98aa5cf825ce2db0673eed1c8c97", "02eeaf823ee47d1e35f10a05f85ad2bffec2b45c"}) 12:21:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(0xffffffffffffffff, &(0x7f00000001c0)="8191", 0x2, 0x10, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendto$ax25(r2, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:21:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x3, "e196b6", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r2, 0x10, 0x1, @in={0x2, 0x4e21, @multicast1}}}, 0xa0) 12:21:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x1279, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:58 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8913, &(0x7f00000001c0)) 12:21:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) 12:21:58 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:21:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000000)) accept$netrom(0xffffffffffffffff, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1c, 0x0, 0xfffffffd, 0x0, 0x0, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x40) 12:21:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) clock_gettime(0x7, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:58 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:21:58 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8914, &(0x7f00000001c0)) 12:21:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) shmdt(0x0) accept$netrom(r0, 0x0, 0x0) 12:21:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000040)={0x11, 0x10}, 0x18) 12:21:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1}}, 0x18) 12:21:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:58 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20800, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 12:21:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3, 0x1, {"ac52c0359199f2a999f687a0b8504b78"}, 0x9, 0x7ff, 0x6}}}, 0xa0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x4, 0x20, 0x5, 0x7, 0x8, @loopback, @private1, 0x1, 0x7800, 0x1c, 0x3}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:58 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8915, &(0x7f00000001c0)) 12:21:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, &(0x7f0000000000)) accept$netrom(r0, 0x0, 0x0) 12:21:59 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x1}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180), r2) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x29, 0xff, 0x0, 0x1ff, 0xa, @private0, @mcast1, 0x8000, 0x700, 0x59d3, 0xc5b2}}) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x88, r4, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0x7f, 0x1d, 0x1000, 0x42, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x700, 0x1, 0x6, 0x7}}) 12:21:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:59 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) 12:21:59 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x891e, &(0x7f00000001c0)) 12:21:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x8, 0x40, 0x3f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x8, 0x700, 0x7, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', r2, 0x4, 0x81, 0x5, 0x80, 0x3, @private1={0xfc, 0x1, '\x00', 0xc0}, @private2, 0x8000, 0x7, 0x4750d2e2, 0x5}}) 12:21:59 executing program 1: sendto$ax25(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x8000, &(0x7f0000000180)={{0x3, @null, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default]}, 0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:59 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) bind$x25(0xffffffffffffffff, &(0x7f0000000000), 0x4e) 12:21:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:21:59 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x892d, &(0x7f00000001c0)) 12:21:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) 12:21:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000040}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000005b7ab4f558d8b27d2dba4935209149b405e0210426de89225ac12529daa1123fb2a4ba614c1a8dd5476805750b332aa28ab66ea99b63c6d5b858b693ddec6ddd95c84bb42c0e26d0e80890ab453add1c19fc0f7d1e38993bf8c07c57515e124f54d1f4f98a7e7ea8e681133bcc2d6f8057e16dcf956686b1c9f0ea3d10054b6dd92dda39acbb46dd7bfee95c6d50a638a6fe6bd6791f0325ef6d0eaa6dbc80f608940419f6f5096b68a7ddbd1816b330ba82feb7576640557033d22edc92a6d1fbc96cee5a40cec3afb3bfeb41eaa7a8748c10852df28b2950ad8db31c4e03b38de8ab82a4", @ANYRES16=r1, @ANYBLOB="000325bd7000ffdbdf250200000004000500060001004e200000"], 0x20}}, 0x200000c0) accept$netrom(r0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000841}, 0x0) 12:21:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:59 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8933, &(0x7f00000001c0)) 12:21:59 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) bind$x25(r0, &(0x7f0000000000), 0x20000012) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20008000) 12:21:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) setsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x4) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x5}}}, 0x90) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000540)={0x9, 0x108, 0xfa00, {r6, 0xfd, "18f6a1", "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"}}, 0x110) 12:21:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) accept$netrom(r0, 0x0, 0x0) 12:21:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:59 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = accept4$x25(r0, &(0x7f0000000140)={0x9, @remote}, &(0x7f0000000180)=0x12, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000040)={'ip6_vti0\x00', 0x9, 0x4}) connect$x25(r0, &(0x7f0000000740), 0x12) bind$x25(r0, &(0x7f0000000000), 0x12) 12:21:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0xc7, 0xe, 0x0, 0x3, 0x0, 0x267, 0x200, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x410, 0x0, 0x4, 0x6, 0x80000001, 0x2, 0x1f, 0x0, 0x7, 0x0, 0xfff}) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@setneightbl={0x1c, 0x43, 0x400, 0x70bd2d, 0x25dfdbff, {0x7}, [@NDTA_THRESH1={0x8, 0x2, 0x8a4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41008}, 0x1) accept$netrom(r0, 0x0, 0x0) 12:21:59 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8940, &(0x7f00000001c0)) 12:21:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440), 0x309000, 0x0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:59 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89b0, &(0x7f00000004c0)={'ip6tnl0\x00', 0x0}) connect$x25(r0, &(0x7f0000000740), 0x12) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000300)={0x1d, 0x8, 0x5, 0x7, 0x8, 0x81}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000002000000329bd7000fddbdf250280800503000000100000fa52e0460008000100ffffffff08000b00f800ffff08000200000000000500160000000000080002007f00000108000b000300000008000b000900008008000f00"], 0x5c}, 0x1, 0x0, 0x0, 0x54}, 0x20008008) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e28, 0x1, @dev={0xfe, 0x80, '\x00', 0xe}, 0x7}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:59 executing program 1: accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @null, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default]}, 0x48) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:21:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:59 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x50f342, 0x0) accept4$x25(r0, &(0x7f0000000040), &(0x7f0000000080)=0x12, 0x800) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x200000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x9, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0xf88da871205c340, 0x5, 0x3, 0x0, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xef41}, @map={0x18, 0xa, 0x1, 0x0, r0}, @ldst={0x6, 0x3, 0x3, 0x5, 0x7, 0xffffffffffffffc0, 0x4}]}, &(0x7f0000000180)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x24, r2, 0x8, &(0x7f0000000200)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xe, 0x339}, 0x10, 0x0, r0}, 0x78) bind$x25(0xffffffffffffffff, &(0x7f00000000c0), 0x12) accept$netrom(r0, 0x0, 0x0) 12:21:59 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, 0x0, &(0x7f0000000040), 0x80000) bind$x25(r1, &(0x7f0000000000), 0x12) 12:21:59 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8941, &(0x7f00000001c0)) 12:21:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:21:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040), r2, 0x0, 0x0, 0x1}}, 0x20) 12:21:59 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0xc180, 0x0) write$midi(r3, &(0x7f0000000780)="da68f952387a3b13832548c4aaad451d579054ad82aab6e4bfd84de6f7f9d621e56ce609a3b53b0f8ef620fb1dac18f941f715504c74d6a15b67694b4b1da530ce0ac729d7fe80c9ef2ae214aab26b9aa228720016b983614ee7386202ff42358470b5f0f85663e841f3d314a386f30a8f6b19abc25d6369c856ebbaa41b878704aa527b6fe6a483628dccd68f29c231893e9307cecff471c8013272442920ded16309157a2381a5b55b860a6e78926b94f5957399df3dc52e09a73972813818b3227f395217ead2371b0f8f6679b0b0c5f4e37c4ecd87df24945dbbc24d6a80b56e8c1a67eed512b7d9e97f224751983cb8c6732aa26ec8a78de480227ebdbc386e209c2d115d0a3b49c68b50a2215f1a110ca007c6c09b881db4cfa83d0528116ed008fe6371c173b4eae960e601bd248a28a0ead9991d0e8d9db172f316a4aa99a0ce4487d2bdb1907b47f6ddf80971c7b11aed9ee903f83434b343341c8f6e27619c689400f744c7364e5730c9ddb62689734ace768ed39ac4373a2566123eca9efd24bbc51359d0f5dd1e17631b23dc03962b29d5b0a6d317ec22419531ceee07bfd291ac9eba73564beab1ae37f4912a2a18347b4166d568f3c9aca2df501a9d40c19d20316ccd866fa8ae2c35b17b9d103ed2b2747bddeb483695b9faf8f0d289820ff4b6819493f4f095bf4a896a81a9a4c76108065abba6086f14581b4f37282f39275d15ff656ec6296a26ed404b0d9b5b59b7032fbf21acb41f99769c69907fedfb8d1320533845129687a972d47831237e4c84e2844202b83fc39bb09a56239e8d3f787ee90f4db25f3012ba7851bd6513609ac9edf2dd5515d3716a19ea9428b16c2940f8df608851741fc2d5e4471f79bfcf92ae2d482e51af499c2f2d2885dd0485f495e1e3521fa709541aeb72fa5c217ac21b40fac3483225ea06da94abf2c4da89e7c19e8edc385940ee1d7855f2fa86f2d5594b2ce733a7aa8122807b1cbd343ae90c79bdb7324a6ac65f9e2506e88857872a8a303530df04f60df6e256140147b37a71f9c743388bf8a1597780bcb7b407d81e107390ad937ffccd266c17648d642a1e9bdaa84eb0c2d0086cfe5667bc38d7effe411d496d799e24852d90d312bf269a5d64e48e5a18b85e07cc1f2171db1686af924cf5368d3c67063536256e62a78a54507c7c6124c4f8926734cd5dff0c8d0a6f979f3256a5621b6f4fa961553e94ffb530e47e0b20b154c43989de0fa11c66b163e2efcad347b9e0ed73ba7c0e144aeb7639723d1907c2a3ec9222a507d4faf7c941aa225e7344b80eb2f60a121ef3cdb9f9d704f3787dafeaf90e3d2bf6bb1e4a5fbbdd57b2784d37c2bc412d89140a9d59311dccf1f60af058f8712431e0cff5fce968ea1a643860b97d35a642ee4c580de29a2136cb93fce81833d6bb072a96313f4aca3305163a300efff18acc486821d8bd97314867d3eccc802ed6c17a2bc2ebf1846e289d6b23ed2ce1851c33f398e77db870d7faa96ebe5bf6bc53575cd461e39bc753bd4eb4b565ccab45fa1cb677df3103c80f3c91e0146a169ead6cccb38a53fd20ef7c3332cbc535f8315dd7ea40f201bbd2727e698201f2b3982bcc4e0f8b0eade1d85add1755b4b3ed5bd6b768fcf6c60565cff8fc7fc6530d8726d3c861b894011b6a7b31f3ba342b0983b9fbe0c486a552d7a0e8e76734c63e2313c2981c2aead82af2ee9db4482f3d0d34a025772b381cca70e9895bdbc4533a895e4652cffb90e4edda55775188d94917d4dae47785b322d5be306a8a21714313bd2ecd29906d86cfdad265973f84d7205cc22026ff9c2c05674a1e71ffef12a3fb3d134d069c0dd6d8faeb8df3c595884b8fa9741125c3ab18b712ba4c13f78ef4749bc6ecfbf02138cdef839790e7cc033c1248107503bb8d83dd1fd6a7af3574ac5770e073caf50a3305f047fb1d8e8493bffc7656386c09bac476157bcb518864782f4ca6843e8f1d5f56972786e5066d92dbcd034936f39d0546ffe39163f3cf032cfd2bd3319f87d317d08ae84b98c1f31fc9cf786987bffe2acbca3cda5f5efb33d54fb32cde7ce61d64abbc2e3373ede16473b73a940a0365ac112dd708e7de5818abd6467ffdd44652fdc577a26508f5bb8db28af5af506e1aca836c76471f9c8538a92de7dd2437431b49480736ac7d138a7cc3fbd18d83e19f40b5780f3b6d5dc1586d33f15f280e59212f70ec331d3e5e947ffa0adabb83efaefd7366f4e2d4caa3f9525aa65e135af691b02b402ec3d41424f8f4d41919c8cf319736422882408302ad17502587f7806ccda5f5be43cc3f4b23e1f4801b09e70e13f2bb5d689a44654d8ed7f76aae624909f93c72d8ba65e0344b71b6b26c896980cec1502a81b8ae029fe3ff62b55b7195f69812698e0be89cb62681839c3d739e96e1e29bfc01442fbdb72f88a3b57ccc601acea554b8362ed0307f4931facbba4220cfb9be51ce8f48bef1c182c995d4feaee4bde8a4d3c54651e2cd79d18ed85bfa0a112609e47db0e37b789e847e4c3acdc4ee5cd892154f11ea76662e0be1236096553e7c6a61af19bdc1eed3e0daef3a738a283242f78ecd237b48e27f76c2bb2fae234c6fd5725b6294cd0682d857dd7996f7a06129bde4c7cf576db3c07e54d19b49a4eef75e8b149ef1e92cf4b75c41c5af46eb4dcb895015999b7baae1f3fc5a51a318450f6ee745b192339ebd67cd822b465c1c5f49230b613c57bea4c0286dc9dc9dad23cf08469a388ca69316d1c52d3d4632e0beb9a712ebcf1eec6678853484161ba2a66d7da02bc2065d935839d3680afff334cdaa53f53ee1448f66742a9348548d26c8a7cf1601394c1dedd203f4446b958ebdd452e6bc65d72bab0f911a445b995d216cb6c46a4fcb7ac3d98a9091a47bdaaf45b578e3dd486da314a289b70efc6c76963395617fce05c40a0c7811756515c5ceeec6dbc7b947531f616eb140cbd5202141c085e57eb877bc61ad421f25e1752d18397cc9f8f362b23f25873e4df527e2199f75e96dfb685b180d9fbf85e26db4dea6613c2f25ba031d1d79dcacf397aa36c90b68deff315befd19e2220cbf2d7f4af0599929f3c98262499b6c2bd5d7e01f3ed83fed383fc82eed591823de9d116ccd0c2e8bc99114830ea5e830645b1277fb97513abaa45c57fa8f80f23c27764af3eb4c2bafbf37d39b699d6eb9e7b0d9cff371db66820d90ac794c544d934303997cffa9d476f8bb2f7e34f94f1722fc37bb3fde9953a1b79b6fa821ae1bda92a630031ae15bfdacebf4e5bab6253fa314544f71613f8ccd9b7873f7bb5a790ff50a4a09dbf825bdb08593356d64898849bda769d053bc33534f791ada399f3d098e0df88c99dc6452bf202a15914b19786b797bde2bf8bd23ad650386b8e112580994a0350a6d8826e4ed942a35c88be805077a2afe2365f1407aad06fe08cb63fce240dad54a75fa6107d8360bfdd76875c760c353438874e569a8a8db4ebb5b36bd8d06ecda071e5331d97dbdaba43c0881f2a814858347db5e7d31cdf4da2299a681006fbe8ddc5b767f7687309974efb1c903d2739d95616e2faf600b8655aa4f7452431fc77b8eb64ce8b746dbce02ae6cc6275acd1e4d7a1083b035effe2671a766fcabe329459a1ef9782e86c31c0938ae7e928e5cdb2822856b64838138ad45d8b3e8b152d45ae072385be92389cc18e70c276a0469de8f02a292e54e9720621ad96550890cd55b31a5a5e5d20645aa261532d57eaa7cdb2e60f8d9474ce253ad1854842e13643c6cf9e2473a44f9e0e0e5d1fe9f7d3639f11922364863a98cac11150e79fe0ddcaf1b1a0129bbe869bca0e02ea7eccf1f3b078f85a408050d9bf7559c0c69c4bc26da654609f2066402b87da3f316b158a4bb9801b7ff0add92e9e65d1102aa97e7d52a9590b0799996bf6cc86ffe58359ce5c230f31e09b5828634cd29019d44078f8f3a5e859777b42a71fd1093a284d9fa2403d7ec9e67fdeaba5962f68dee7ba63831774f512c4bb3549662aa47c6466fc312720f47b8f7d6522df7fa39d21a46453477030413c7d644952a9f389883c53be5561333a09fdfb746d849632d9635aedaa08e75c9c5bc80f0c0212e83670c384c15d511270623c21eca645533005e140d2d86be438329e5e00ca20b2f96e609e741744ed5d906a3827432b2939e7a916be3ffcd89d06854684df318e8064e48139f27b46503990542ddd816d4b0861107f12d73d33994a48949616d4b7517eccd4fae924b7e60409488d0aadb9e6d378016cf6925dbb64fe7ad9bbfa195f0a09e9272f1447ee135573977d68e318acd3ab6ca7edd18c61eb9a292ba362f463ada711c029e649e218050526d103285ae501c69df367c836df234c163bfac70705acb2dd0619c0a4120e1e919be4d870937f233d84b9b6b73f78f6629d94215cc9aeeb6876656e7adc013d0dc215fca90f9f7f47009c7ea9cd5945269e6eddc259cf12225dcc6619faa465a4027fb9592fb682f1dcfa598b22ef9f296ea9e74e1a535cadc86f77beb38c467927d57f2cf2d711d8d35d20070a7fc52b1b546216feff30461e85345c8dd75234e4a8dbc241a19d4d1ea8a367e83ed5ab34545a95f5844d37110fb9e28c29cadadda45676f1702398f7331406ee011cf1a9be4b0938fe3c05c1546f0c4c9e5ab685eccaff1ca5a7aecbdf55f0fed43f8871185c1106132bbd81ac47e621b13675ed110949c44dc87700556d232249701bb11cbda97565f1737722062d07f04ef695b94d706010b44b76710f8d2b12f4a1ea6941fb7fc560bf95ac1c028acf92caa2158c1502b10762e4b80d8e4ce53b665b61b73ce78e6865c7de482440fdc1230d58d160d9cdc525e71901b0802548e108697cea8150aafe805a5f7c6ba1923c4a120e3a958b849de946d4c1105d7fd00164283e81530b4be2d05994758e15f8047fae4fc006e68de2794d436990e93a6b556c60849ff3b0bd81e5c5548f8428db39369b68ceef326f44ad17e257497dd44c04f4ea08b511f6889d4d2d312c462b916861c777fb14a3c8d9b5912cd0e837e9d04c390f20eefe0470a91edb56acd4797a6c9019ea69f01af68f7ab7c80b2c3f8fd51dbe36ed2ee759766cb0531ed497f035abe25c84d1328705a8e0ab480ff4c356598840c99365856400c2905c85031614a6ec6c4e91220e089db3fa352d977939bc137231482d9b2594520c0d6a84bc9d3ead2c5ccd8f1428488d13fd1dd460d70d8baacb3ea8bd14bf9eb6e4c6e0d9106aa58d2eb736119ef5620330d06b6fd7e881f3fa0358c1b0c24e6b41e5fd0d38dd019b0be8617a26eebab5b466e241081ed3294459499348e7ce34ecba24af9c160790d0aa160d07b4f3b8f3d2c28750efc47bb8a1e70361a329d071525378f6cbfce1886e178fa7cdf35c489a8ea86661f8bd1999d724678ce361b49112ac12eed75c3f96a16c58e8f3868a002f0f6ff1dd50fc78aafc83b84592a6b083b5814541572e2043ed477889a1fddd1fa12834e7e71ed8403ed4a302973034daf4e0fb01360ba8e85683393f4b0175e1141c28d1a9eefad8092fbad428e84636e03e86858b7386b551bd6e046dbd29272d31032f21a37ed3bd1b189684a9b66a45c0e8c1d7213d4d35e826b340a14e08db59d5cb6423dbd4399b6d872da6455d807289f0e3d7b311e60e96feb4c6a39d3af4c7456662e93185bb24afdec20d37431bd6e4f8115e5bf9146d30b03d55360f30ec", 0x1000) r4 = accept4(r1, &(0x7f0000000100)=@hci, &(0x7f0000000180)=0x80, 0x80000) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f00000003c0)={0x3a}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x4, 0x0, 0x7, 0x4, 0xc, @mcast2, @mcast1, 0x20, 0x8, 0xffffffff, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r4, 0x89fa, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f00000002c0)={'sit0\x00', r5, 0x2f, 0x2a, 0x81, 0x9, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000, 0x700, 0x1f, 0x91af}}) 12:21:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000022c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000002400)=""/227, 0xe3}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)}, {&(0x7f0000000080)=""/139, 0x8b}], 0x4, &(0x7f00000012c0)=""/4096, 0x1000}, 0x2180) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000002700)={'sit0\x00', &(0x7f0000002680)={'syztnl2\x00', 0x0, 0x2f, 0x7, 0x80, 0x2, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, @private2, 0x7800, 0x30, 0x3, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000002380)={'syztnl2\x00', &(0x7f0000002300)={'ip6gre0\x00', r2, 0x4, 0x4, 0xff, 0x4, 0x29, @private2={0xfc, 0x2, '\x00', 0x3}, @private2, 0x20, 0x20, 0x3, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000003ac0)={'sit0\x00', &(0x7f0000003a40)={'ip6_vti0\x00', r3, 0x0, 0x0, 0xff, 0x1, 0x4, @empty, @empty, 0x1, 0x8, 0xfffffff7, 0x7}}) bind$can_j1939(r1, &(0x7f00000023c0)={0x1d, r3, 0x3, {0x1, 0xf0, 0x2}, 0x2}, 0x18) recvmsg$can_bcm(r1, &(0x7f0000000140)={&(0x7f0000001180)=@ax25={{0x3, @null}, [@rose, @bcast, @bcast, @null, @netrom, @netrom, @bcast, @null]}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002500)=""/175, 0xaf}, {&(0x7f0000003b00)=""/213, 0xd5}, {&(0x7f00000025c0)=""/144, 0x90}, {&(0x7f0000001200)=""/128, 0x80}, {&(0x7f0000002780)=""/172, 0xac}, {&(0x7f0000002840)=""/239, 0xef}, {&(0x7f0000002940)=""/77, 0x4d}], 0x7, &(0x7f0000002a40)=""/4096, 0x1000}, 0x12003) 12:21:59 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) memfd_create(&(0x7f0000000040)='\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x5) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f00000000c0)={'veth1_virt_wifi\x00', 0x100000000, 0x7}) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0x81, 0x8}) 12:21:59 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x894c, &(0x7f00000001c0)) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:00 executing program 4: socketpair(0xa, 0x80000, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed}, &(0x7f0000000080)=0xe, 0x80000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x895d, &(0x7f00000001c0)) 12:22:00 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') fcntl$getown(r1, 0x9) 12:22:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair(0x9, 0x3, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 12:22:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = accept4$x25(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x12, 0x800) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000200)) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 12:22:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x400102, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000000)={@default, @bcast, 0x2, 0x56}) accept$netrom(r0, 0x0, 0x0) bind$802154_dgram(r1, &(0x7f0000000100)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0202}}}, 0x14) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8982, &(0x7f00000001c0)) 12:22:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x8000, 0x80000001, {"d22c1ac198fdbbb7fac7c429dda069e3"}, 0x7fff, 0xffffffff}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 12:22:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x5, 'netdevsim0\x00'}) r2 = accept4$x25(r1, 0x0, &(0x7f0000000180), 0x800) accept4$x25(r2, &(0x7f00000001c0)={0x9, @remote}, &(0x7f0000000200)=0x12, 0x80800) 12:22:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000380)=[{0xa, 0x0, [0x5, 0x7, 0x7ff, 0x3, 0xc0d6, 0x2, 0xa000000, 0x0, 0x1000, 0x3, 0x100, 0x7, 0x0, 0xa9, 0x9, 0x7]}, {0x28, 0x0, [0x6, 0xd7200000, 0x9, 0x10001, 0xfff, 0xda, 0x3, 0x200, 0x1, 0x40, 0x0, 0x1ff, 0x2, 0x9, 0x8, 0xfc7]}, {0x0, 0x0, [0x4, 0xbf3f, 0x2, 0x100, 0x7, 0x8, 0x401, 0xfffffe01, 0x8, 0x10001, 0x1, 0x1, 0x3, 0x9, 0x2b4ad31e, 0x80]}, {0x0, 0x0, [0x3, 0x4, 0xfffff386, 0x8, 0x0, 0x5d, 0x4, 0x7, 0x10000, 0x2, 0x0, 0x4, 0x40, 0x96, 0x7fff, 0x16]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8983, &(0x7f00000001c0)) 12:22:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = accept$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@rose, @bcast, @rose, @netrom, @bcast, @null, @default, @rose]}, &(0x7f0000000080)=0x48) accept4(r2, &(0x7f00000004c0)=@l2, &(0x7f0000000540)=0x80, 0x800) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) 12:22:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0xfffffe12}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 12:22:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000040)={0x6e}) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89a0, &(0x7f00000001c0)) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000040)={0x11, 0x10}, 0x18) 12:22:00 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x6, 0x1, 0x9, 0x9, 0x1020, 0x1, 0x33d, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @mcast2, 0x5}, r4}}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r2, 0xc0385720, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89a1, &(0x7f00000001c0)) 12:22:00 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = accept4$x25(r0, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) bind$x25(r2, &(0x7f0000000000), 0x12) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:00 executing program 3: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 12:22:00 executing program 1: r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0xc00) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x98480, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000200), &(0x7f0000000240)=0x4) bind$x25(r0, &(0x7f0000000300)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x31}) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@null, 0x4, 'veth0_virt_wifi\x00'}) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) accept4(r3, &(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000500)=0x80, 0x800) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}, 0x4, 'veth0\x00'}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e0, &(0x7f00000001c0)) 12:22:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7ff, 0x80000000, {"975f4530906bb72f0ffec80fab2b96f1"}, 0xffff, 0x5, 0x100000001}}}, 0xa0) 12:22:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) 12:22:00 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e1, &(0x7f00000001c0)) 12:22:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000180)=0x1001, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, '\x00', 0x17}, 0x80000001}, r3}}, 0x30) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1000}}, 0x18) 12:22:01 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) accept$netrom(r0, 0x0, 0x0) 12:22:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 12:22:01 executing program 0: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x6) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000080)={'gre0\x00', 0x100000001, 0x7fff}) r1 = accept4(r0, 0x0, &(0x7f0000000180), 0x800) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000001c0)={'virt_wifi0\x00', 0x6, 0x1025}) bind$x25(r0, &(0x7f0000000040), 0x12) 12:22:01 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000001c0)) 12:22:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) sendto$ax25(r1, &(0x7f0000000040)="ce6055941e6116783ae89bcfed15e733a85c396b52755a44b5d30f43df1be7250e479a74522bcb727caeb58f80118f767b6fd4dd66b8026f36cc953861bbf58e86156771d6be021cb01c515a4ad4943954f342e88025bda1d87f6442c71a9dc0f4b07d6453a395fbb2a251bd32680dbcf8a2d0d011aedecafe66813f3dd9f77b5f5f10cce42f3903263b2853f4b0cf81356b600ed1b7b91740a104af667a3ba196ec78873e3f8efd6f54215482e60da0942db0a7a5387801bbeb580bd3dc243ae6cccbbd2bec7a10a62ccf56e34e871dd67c", 0xd2, 0x0, &(0x7f0000000140)={{0x3, @bcast, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default]}, 0x48) 12:22:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) socketpair(0x21, 0x800, 0x8b3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f00000000c0)=0x5, 0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r7, 0x10, 0x0, @ib={0x1b, 0x5, 0x1, {"ac59bf9c20cbe883a6683c2cc294a5a7"}, 0xe6, 0x80, 0x3}}}, 0xa0) r8 = getpgid(0xffffffffffffffff) write$cgroup_pid(r2, &(0x7f0000000040)=r8, 0x12) r9 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r9, &(0x7f0000000740), 0x12) ioctl$SIOCX25GFACILITIES(r9, 0x89e2, &(0x7f0000000100)) 12:22:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000640)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000006c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000540)=[{0x2, 0x0, [0x1, 0xf55b, 0x1f, 0x80, 0x3, 0xffff, 0x324, 0x8, 0x8, 0x0, 0x2, 0x2, 0x9, 0x1, 0x3, 0x8]}, {0x10, 0x0, [0x9, 0x5, 0x2a4, 0x3d, 0x2, 0xdde, 0xffffffff, 0x1, 0x8001, 0x0, 0x8e, 0x3f, 0xb9, 0x8, 0x9, 0x4]}, {0x4, 0x0, [0x7ff, 0x21, 0x8, 0x9, 0x100, 0x0, 0x3ff, 0x1ff, 0x9, 0x1000, 0x101, 0xfff, 0x8, 0x40, 0x9, 0xda1]}], r4, 0x1, 0x1, 0xd8}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x6}}, 0x18) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0), 0xfe3fa77f705dbd80, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000400)={0x9, 0x108, 0xfa00, {r2, 0x4, "aedf70", "09b4edd90ec450c4eb3aa2997190fb7bc660ab68e0067005435dfad1649e89fc1b24ad7710aa577e72835d4ab75dc0df3497ee639b9e72d40b52a2bcaef23da01dde0f9f9bf95330586ebb79ace2ad2b66c199477a10f87e28e9a552110ec9dc87f85161a5849d71dfdd642b28b4e9a291d35a7b9a5ec2d8f87e10bf2d831fffbfac125879ebb92e1f94e2f2db2f9d7a5d075f3db8fc30200b98fded10674e0f108d7b8cd44035e5679d19ade2953403b42b70bccdd983931f1e0deb436623eaf3ff06d6d55b2733b8e62236b7d600d44789bad81b710be3d2b3c2bf8f6b08da6512628474bfc42d8c72612f02dbe439bbbe19100420fcdbe8f7e6a0a2daf242"}}, 0x110) sendmsg$802154_dgram(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14, &(0x7f0000000240)={&(0x7f00000002c0)="e865211e80d4f701c111cffa34854fc2e57152c73f8bbcfa0af4f52f1b05b3e8f1fd6fb594007fb47fbefc9109fac692fb9ad4f61508f2b7d86b973e3462690b2a4e6cee6f41e7013e487ea26ec3a011b280e8e704515f352ec9003b5f20d663eb63ae68c4a9c716d456a0caf71d", 0x6e}, 0x1, 0x0, 0x0, 0x20000885}, 0x20000010) 12:22:01 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_IFINDEX={0x8}]}, 0x3c}}, 0x4041) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000280)={0x6, 0x3f}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x80000, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) sendto$x25(r2, &(0x7f0000000100)="2a48e1e139c5de22253a03fffbb265f874b504a71fbf686e0347b87f374b69d32e906c23bd751d88b2b43ed222991f6403ac83b0e1037aa1227916e1c06acb856346643698acbebd356a8438aa8ad4d75a3c82e1002eca4886712ed982b55a3e5310bebe476f890c885d67abb21a29d1456cd2efd77506cca44e2f3866811aa2d0424d80c03531144d60c8f6ecabefe55546c7af65b1d45eadca4e34bef0b0bfb86edb2ce0bee45f6a7bf73c4653fc883859ced85e1e184b843239926ec6340a2000f5bbe6528110101da25cc410bed91da299eae6cadf5f4c0a96d5ca52ed28", 0xe0, 0x8d1, &(0x7f0000000200), 0x12) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x3ff, 0x1, 0xb, 0x4, "535d7b530e57ca21686d9182d9644f6dd829c15a8685f383194801000000382f0a51a838f7077c0b92ca2d0aa2aed1898cab85093f6b04ae3e45cc3b207bacd7", "535d2a5998e70000000000e4ff00000000000000000000000000000000000005", [0x9, 0x9]}) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x808c) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000003c0)={0x6000, 0x0, 0x0, 0x2, 0x0, 0x24, 0x23, "6a01829d97532a6d2b0054cc8325c5baccad133b", "109c02873b4062b96184be8910686d9473e3ae13"}) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:01 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e3, &(0x7f00000001c0)) 12:22:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:01 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x301000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001e00000127b87000ffdbdf2500000000"], 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x10) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000040)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) 12:22:01 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x6c, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x11}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @local}}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x40080) 12:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x1}, @FOU_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8004}, 0x81) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:01 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e4, &(0x7f00000001c0)) 12:22:01 executing program 0: bind$x25(0xffffffffffffffff, &(0x7f0000000080), 0x12) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000040)={0x74, 0x8, 0x80000000, 0xc, 0x5, 0x81}) 12:22:01 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x2f, 0xf0, 0x6, 0x6, 0x12, @loopback, @loopback, 0x10, 0x80, 0xffff, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r1, 0x2f, 0x1, 0x80, 0x9, 0x20, @mcast2, @local, 0x40, 0x10, 0xb4800000}}) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000040)={0x65, "ed202b6d40662600153c9655d5526ebfc30308710ee67fba224173fe053b337d41379696c88272d781e594347c7fb00ac1b813131e1fe0094522a1cd5d5bf291db9f3c02ae66f630430751ca0c73951770d67d7e14c378e5349899a06c2d35cbab70430aed9ce6dcf656a158d59cf012de3cd4432900878799aa4869703ae765"}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f00000002c0)={r0, 0x1, 0xfffff000, 0x4000}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r2) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x70, r4, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0x3c}}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfe}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4048040) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000300)={r5, 0x0, 0x10000, 0xfffff000}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) accept$netrom(r1, 0x0, &(0x7f0000000000)) 12:22:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r0, 0x0, "c7b4f8", "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"}}, 0x110) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x67, 0xfa00, @ib_path={0x0}}, 0x1b) 12:22:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 12:22:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:01 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e5, &(0x7f00000001c0)) 12:22:01 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040)=0x8, 0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0)=0x26, 0x4) connect$x25(r1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000080)={0x3, 0x8000, 0x9, 0x4, 0x7, 0x21, 0x25, "438c05fea69ac0e2eed8536dd25e1571d06340fd", "56d9aa40267c209c6065189496e3f696cb8b615d"}) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x24000850) 12:22:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0xa7f, "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", 0x80, 0x20, 0x2, 0x0, 0x6, 0x7f, 0x8}}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10}, 0x18) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x6, 0x6875113c, "e563e9a9314db8530a26c8d0414a0de63baf38a610239fcf92993cbd0ca75f3fc8a914ef58058051fdd6b18270388076007293d0c289b07ec8de13f73992362fdef117cd2ea094f7e0702053f512e4b7978e343a20ba5ce6ff3724dadc880996b5566d5707b7624d3edc2c70ded665883b13594c3246ae5d94a59dbfd0dc578cb68a076511e9658dc2325871cd01c37d4e7fca4b75a5cdb7c643b6f705652f4138b5f2ac98e0e7e3a1067692737ba92b5f8838eb599cb42ae11801948be8a39c88e288f32b3fbce2a621cc2385fd4ebec73fad84824f5dffc18691605d88e5252b5501c98d08a1419bfdc03b4d266a80b00403fdc754c70e85447a94ce2cb20b", 0x0, 0xf7, 0x9, 0x8, 0x0, 0x0, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xd343, @mcast1, 0x8}, r4}}, 0x30) 12:22:01 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x9) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) 12:22:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000004200080029bd7800bfe50810ba3614036fa6df7699e4dbc2aa06f47dbe"], 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x20000840) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:01 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e6, &(0x7f00000001c0)) 12:22:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @ib={0x1b, 0x4, 0x81, {"1822ca02d046c47e2759f0a77b31c5f2"}, 0x9, 0x0, 0x8}}}, 0x90) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000180)=0x1ff, 0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 12:22:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x1, 0x81, 0x2e, 0x5, 0x0, 0xc4, 0x1c002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7, 0xffeffffffffff800}, 0x1020, 0x7d5, 0x3, 0x2, 0x90, 0x504cd35d, 0x5, 0x0, 0x32a22a25, 0x0, 0x1}, r1, 0x3, 0xffffffffffffffff, 0xb) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) accept$netrom(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000280)={0x5, 0x80, 0x80, 0x0, 0x6, 0x0, 0x0, 0x6d7, 0x8, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x8, 0x1, 0x8, 0x6, 0xb0, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x8}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x13f1c0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = perf_event_open(&(0x7f0000000640)={0x650bbcb7cbd27458, 0x80, 0x40, 0x81, 0x7b, 0xc, 0x0, 0x3, 0x20000, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000300)}, 0x80, 0x1f, 0x6, 0x2, 0xfffffffffffffffb, 0x6, 0x400, 0x0, 0x4, 0x0, 0x6000000000}, r1, 0x5, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r4) sendmsg$nl_route(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c002e7173f4a9e3f9ab7000fddb76b9a5bb28e55dd11ddf250208000200ff07000008000200f8030200"/53], 0x2c}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000015) ioctl$SIOCX25GSUBSCRIP(r3, 0x89e0, &(0x7f0000000540)={'wg1\x00', 0x1, 0x4}) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0), 0x200, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x2f, 0xa0, 0x1, 0x6, 0x0, @loopback, @empty, 0x10, 0x700, 0x0, 0x4}}) socketpair(0x29, 0x80000, 0x9, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000004c0)=0x4, 0x4) r8 = accept4(r7, &(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x80, 0x800) ioctl$SIOCX25GCAUSEDIAG(r8, 0x89e6, &(0x7f00000000c0)={0x9, 0x4f}) 12:22:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0xffffff00}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x800, 0x8, "3c97dae54986963b17c01b5b0cdb9ea654986e6d2adb0e0e5c850d7f170db47cdb1700008e3885e2e8f5e09b3f023d302d5612e1e136803029e948a847b25b0df181e7c2dc486639199190632d17db2542bcc707fa1fbc913a5ff9d95ca7688d6deb05dfbd71fa30c8b36656913fc210c44d59b2e2ca47ee7ed87f9480fd5be46a45d455d1429f3ef08eefbac37c24c06546567989f9e0ab61873b07ba2f9b23fe86125d2639e8a878dc436bca7391fde8e46b5e9537642b14edd54978cc054a2e1ba1a26c076083cf38ea25cc0bd53546470c5fadcd87f9a5af4e6d666949762805efca5ea646c00df1d31e0849007356466e6f506e9141b011a3cda0043760", 0x0, 0x81, 0x61, 0x5, 0xc, 0x1, 0x7, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:02 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e7, &(0x7f00000001c0)) 12:22:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000040)={0x4}) 12:22:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x100000e, 0x80014, 0xffffffffffffffff, 0x100) 12:22:02 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(0xffffffffffffffff, 0x0, 0x0) 12:22:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:02 executing program 4: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)}}, 0x17) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x2}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) connect$x25(r3, &(0x7f00000001c0), 0x12) connect$x25(r2, &(0x7f0000000740), 0x12) bind$x25(r2, &(0x7f0000000000), 0x12) 12:22:02 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e8, &(0x7f00000001c0)) 12:22:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x3f, @rand_addr=' \x01\x00', 0x2}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) fcntl$getown(r0, 0x9) 12:22:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="7d0f0000", @ANYRES16=0x0, @ANYBLOB="000429bd7000ffdbdf2502000000050007000300000008000900000000000600020059cc000014001f00fe8000000000000000000000000000aa0800110000000000"], 0x48}, 0x1, 0x0, 0x0, 0x20000014}, 0x4040880) accept$netrom(r0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r1) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r3, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3f}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}]}, 0x48}, 0x1, 0x0, 0x0, 0x4044000}, 0x20048014) 12:22:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = socket$can_j1939(0x1d, 0x2, 0x7) accept4(r1, &(0x7f0000000040)=@ax25={{0x3, @rose}, [@remote, @netrom, @null, @netrom, @null, @netrom, @null, @bcast]}, &(0x7f00000000c0)=0x80, 0x800) 12:22:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:22:02 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x40) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x1800000000, 0x2400) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000080)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:02 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e9, &(0x7f00000001c0)) 12:22:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:22:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0x7, 'batadv_slave_0\x00'}) 12:22:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='%!@%\\\x00') 12:22:02 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x9) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) 12:22:02 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r5, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400)=0x55, r4, 0x0, 0x0, 0x1}}, 0x20) 12:22:02 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89ea, &(0x7f00000001c0)) 12:22:02 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x3}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3a}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000004}, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x82200, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) accept$netrom(r1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 12:22:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x4, 0x80, 0xff, 0x4, 0x2, 0x5, 0x0, 0x2, 0x80221, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2e, 0x4, @perf_config_ext={0x7, 0x100000001}, 0x0, 0xfffffffffffffbf3, 0xaeb0, 0x1, 0x3a39, 0x800, 0xffff, 0x0, 0x4, 0x0, 0x1000}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x4, 0xff, 0x0, 0x200, 0x48, @local, @mcast1, 0x40, 0x20, 0x8, 0xffff6b36}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:02 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 12:22:02 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89eb, &(0x7f00000001c0)) 12:22:02 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080)=0x1, 0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x8910, &(0x7f00000004c0)={'ip6tnl0\x00', 0x0}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x1000) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, 0x0, 0x1, {0x2, 0xff}, 0x1}, 0x18) accept$netrom(r2, 0x0, 0x0) 12:22:02 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 12:22:02 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 12:22:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89ec, &(0x7f00000001c0)) 12:22:03 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) 12:22:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socketpair(0xc, 0x4, 0x9e, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r2, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xfffffffffffffff9}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x1) 12:22:03 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89fb, &(0x7f00000001c0)) 12:22:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3, 0x1, 0x1, 0x55}}, 0x84) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x101400, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r7}}, 0x18) 12:22:03 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x62}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc048}, 0x8090) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18010000", @ANYRES16=r0, @ANYBLOB="000202000000fddbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="fc00028038a94d000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300fe6100000800040005000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ffffff7f08000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000600000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400000000000800070000000000"], 0x118}, 0x1, 0x0, 0x0, 0x40000}, 0x80) socketpair(0x18, 0x1, 0x159, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x1c, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48}, 0x4000) 12:22:03 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="100026bdcaf400200600030000040000"], 0x1c}, 0x1, 0x0, 0x0, 0xc800}, 0x40881) connect$x25(r1, &(0x7f0000000740), 0x12) accept4$bt_l2cap(r1, &(0x7f0000000100), &(0x7f0000000140)=0xe, 0x80000) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x2, 0x80, 0x7, 0x2b, 0x1, 0xf6, 0x0, 0x5a, 0x1000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x677, 0x7fffffff}, 0x20, 0x3f, 0x80, 0x3, 0xf0, 0xb3, 0x0, 0x0, 0x191, 0x0, 0x9}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000280)={0x27, 0x400, 0xa, 0x9}) bind$x25(r3, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:22:03 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x400448c9, &(0x7f00000001c0)) 12:22:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x60600, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x2, 0x6, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80, 0x8, 0x69c9, 0x7}}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)) accept$netrom(r0, 0x0, 0x0) 12:22:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x716b50041e5ded0e, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) 12:22:03 executing program 4: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x80800) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000640)={'ip6gre0\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x4, 0x0, 0x3, 0x9fa0, 0x47, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, 0x20, 0x7800, 0x6, 0x8}}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r1, 0x2, {0x2, 0xf0, 0x2}, 0xfc}, 0x18) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200080c1}, 0xc0) pselect6(0x40, &(0x7f0000000040)={0x6, 0x2, 0x0, 0x5, 0x1, 0xffffffffffffffff, 0x100000001, 0x1}, &(0x7f00000006c0)={0x4, 0x4, 0x3, 0x4, 0x1, 0x6, 0x5, 0x4}, &(0x7f00000000c0)={0x40000007, 0x0, 0x401, 0x1, 0x1000, 0xfffffffffffff9f5, 0x0, 0xb8b}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x7]}, 0x8}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x402400, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) sendmsg$nl_route(r5, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={0xfffffffffffffffc}, 0x1, 0x0, 0x0, 0x8040}, 0x4000000) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c0000000f140418022aca7000fcdbdf25080001000100000008000001636d61000c00450072646d615f636d000800030002080001004200000098e968990465"], 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$SIOCAX25DELFWD(r5, 0x89eb, &(0x7f0000000580)={@bcast, @default}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000700), r3) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, r6, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x400c001) 12:22:03 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = accept4$x25(r0, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x80800) bind$x25(r2, 0xfffffffffffffffd, 0x0) 12:22:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x400448dd, &(0x7f00000001c0)) 12:22:03 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:03 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000140)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) accept4$x25(r3, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x400454ca, &(0x7f00000001c0)) 12:22:03 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) 12:22:03 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) bind$x25(r0, &(0x7f0000000040), 0x12) accept4$x25(r0, &(0x7f0000000000), &(0x7f0000000080)=0x12, 0x80000) 12:22:03 executing program 3: accept$netrom(0xffffffffffffffff, 0x0, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 12:22:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x8}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0)=0x3, r4}}, 0xffffffffffffff56) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x40049409, &(0x7f00000001c0)) 12:22:03 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x9}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:03 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) syz_open_dev$amidi(&(0x7f0000000040), 0x2d324303, 0x1) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) bind$x25(r1, &(0x7f0000000080)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:22:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) 12:22:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x4, {0x6, 0x7ff, "0312e3c1cb679dc3318da2972e1c1aa6a4ff660b505ad5b78b962e865dea52a190855f50b5dff7b6ba1a93411e06e1500259604100c4521dbeb7bc1ee73ea0ea4c884c770d6a8eb1490600a3e822e2261a58ba93f060d107668ac9c571fcc774ceb3c8400153814bb1c2015a3a295206a21d073e6597cd4709f00b1fa1a2b1c5ba551020a2fceecda268f708c65a93e45e0428d03b1730b61a891d996e0b2f6c9fadc7e78026ceab1ced4f1a96d8b5969275228e852800bddcf4a803074701491439623fe4d655eaf269eecc35bb1bb753711c3c7e3be6f164db5c79dd6f2f11c3fd8cc6c3ebe76dd2521390588ddb16697e93eefc1011ec743049a776cc2790", 0x4, 0x8, 0x0, 0x64, 0x0, 0x6, 0x80, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x1f, r3, 0x0, 0x0, 0x1}}, 0x20) 12:22:03 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x40086602, &(0x7f00000001c0)) 12:22:04 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:04 executing program 0: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r0, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24040890) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000040)={0xc}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000500)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}, 0x1, 'batadv_slave_0\x00'}) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x29, 0x4, 0x7, 0x6, 0x0, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x40, 0x0, 0xffffffff}}) 12:22:04 executing program 3: ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000000)={0x1, 0xfff, 0x1000, 0x1}) r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@null, @remote, @rose, @bcast, @bcast, @bcast, @bcast, @bcast]}, &(0x7f00000000c0)=0x48) syz_open_dev$amidi(&(0x7f0000000140), 0x3, 0x500) accept$netrom(r0, 0x0, 0x0) 12:22:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, r7, 0x0, 0x1, 0x4}}, 0x20) 12:22:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x40186366, &(0x7f00000001c0)) 12:22:04 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:04 executing program 5: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x2}) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0x400, 0x3, "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", 0x80, 0x9, 0x81, 0x0, 0xc1, 0x3, 0x1f, 0x1}}}, 0x120) accept$netrom(r0, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) connect$x25(r4, &(0x7f00000003c0), 0x12) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 12:22:04 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) accept4$x25(r0, &(0x7f0000000040), &(0x7f0000000080)=0x12, 0x400) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) 12:22:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x401c5820, &(0x7f00000001c0)) 12:22:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) socket$nl_rdma(0x10, 0x3, 0x14) 12:22:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:04 executing program 5: syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:04 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x86081, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0xa8, 0xd3, 0x6, 0x0, 0xff, 0x38, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0xea4, 0xaf}, 0x0, 0x1ff, 0x20, 0x8, 0x100000001, 0x4, 0x9, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) 12:22:04 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008084}, 0x880) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2dc, @private1, 0x705bd2aa}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r1, 0x1f, "f8c200", "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"}}, 0x110) 12:22:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x4020940d, &(0x7f00000001c0)) 12:22:04 executing program 5: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:04 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) accept$netrom(r1, 0x0, 0x0) accept$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @rose}, [@netrom, @default, @default, @remote, @default, @netrom, @remote, @bcast]}, &(0x7f0000000100)=0x48) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x2, 0xff, 0x81, 0x0, 0x8000, 0x2044, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, @perf_config_ext={0x5, 0x40}, 0x24b4, 0x4, 0x53e, 0x4, 0x1f, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 12:22:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x80086301, &(0x7f00000001c0)) 12:22:04 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000080)=0xc) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x8, "986961", "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"}}, 0x110) 12:22:04 executing program 5: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x2680, 0x0) 12:22:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_syncookies\x00', 0x1, 0x0) write$sysctl(r3, &(0x7f0000000180)='4\x00', 0x2) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0xfffffffffffffeb3, 0xfa00, {0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r5, 0x1f, "16ede1", "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"}}, 0x110) 12:22:04 executing program 5: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x2680, 0x0) 12:22:04 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x80086601, &(0x7f00000001c0)) 12:22:04 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:22:04 executing program 1: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x1800) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) accept$netrom(r0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000000c0)=0x32, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) fcntl$getown(r2, 0x9) connect$x25(r1, &(0x7f0000000740), 0x12) 12:22:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) fcntl$getown(r1, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) connect$x25(r6, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r5, 0x5}}, 0x18) 12:22:04 executing program 5: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x2680, 0x0) [ 2137.930832][ T8983] Bluetooth: hci5: command 0x0405 tx timeout 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x80108906, &(0x7f00000001c0)) 12:22:05 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@bridge_delneigh={0x64, 0x1d, 0x300, 0x70bd2c, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x0, 0x8, 0x3, 0xc}, [@NDA_LLADDR={0xa, 0x2, @local}, @NDA_PROBES={0x8, 0x4, 0x200}, @NDA_CACHEINFO={0x14, 0x3, {0xffffff66, 0x400, 0xe6, 0x1f}}, @NDA_SRC_VNI={0x8, 0xb, 0x3}, @NDA_VLAN={0x6, 0x5, 0x1}, @NDA_LINK_NETNSID={0x8, 0xa, 0x415}, @NDA_SRC_VNI={0x8, 0xb, 0x1f}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x8001) 12:22:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r4, 0x5}}, 0x18) 12:22:05 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040884}, 0x2000000) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) 12:22:05 executing program 5: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r1, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @mcast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PEER_COOKIE={0xc}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004080}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000200)=0xc2, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x7, "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", 0x0, 0xaa, 0x5, 0x9, 0x7, 0xfb, 0xbb, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0x10}, 0x18) 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x80108907, &(0x7f00000001c0)) 12:22:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x4dd, "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", 0x3, 0x4, 0x4, 0x80, 0x8, 0x6}, r4}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r5 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000140)=0x80, 0x80800) getsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 12:22:05 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x801c581f, &(0x7f00000001c0)) 12:22:05 executing program 3: fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x86000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) accept$netrom(r0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x8, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000400)='syzkaller\x00', 0xfffffffe, 0x1000, &(0x7f0000000440)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000001480)={0x0, 0x9, 0x7fffffff, 0xc}, 0x10, 0x0, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x11, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffff8e5}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x1000}]}, &(0x7f0000000300)='syzkaller\x00', 0x7d1, 0x0, 0x0, 0x6bdfaeb37d520a4d, 0x1, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x4, 0x4, 0x3}, 0x10, 0x0, r2}, 0x78) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r3, 0x6, '\fK ', "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"}}, 0x110) 12:22:05 executing program 5: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:05 executing program 4: clock_getres(0x6, &(0x7f0000000140)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101101, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x7, 0x0, "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", 0x7f, 0x9, 0x6, 0x8, 0xa5, 0x40, 0x4, 0x1}, r2}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580), 0x4}}, 0x0, 0x0, r4, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000600)={0x11, 0x10, 0xfa00, {&(0x7f00000005c0)}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) socketpair(0x6, 0x3, 0x7, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$nl_route(r5, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=@ipv6_getaddrlabel={0x60, 0x4a, 0x400, 0x70bd26, 0x25dfdbff, {0xa, 0x0, 0x18, 0x0, 0x0, 0x7}, [@IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_LABEL={0x8, 0x2, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000081}, 0x4008001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:05 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x4102, 0x0) bind$x25(r0, &(0x7f0000000000), 0x13b7b9cc) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair(0x0, 0x6, 0x2e, &(0x7f0000000180)) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f00000001c0)={0xaf3, 0xf55e, 0x1000, 0xb0, 0x8, 0x1f, 0x15, "94c00e8086af43c58fa5fa58aae84844cc96ce20", "1494ddc1bb36a68264db08285c85050536919394"}) bind$x25(r0, &(0x7f0000000040), 0x12) 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc0045878, &(0x7f00000001c0)) 12:22:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="64000000070000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x400, 0xb4, &(0x7f00000000c0)=""/180, 0x41000, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xed7f, 0x1000}, 0x10}, 0x78) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000280)=0x4, 0x4) accept$netrom(r1, 0x0, 0x0) 12:22:05 executing program 5: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r11}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r10, 0x1}}, 0x18) 12:22:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, r3}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r5, 0x89eb, &(0x7f0000000000)={0x7ff, 0x1, 0xcae, 0x1, 0x7e, 0x16, 0x12, '\a(=\n\a\x00', "861e21df808b0587c471a88373e33a5b62f70514"}) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x80180, 0x0) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f00000000c0)={0x6e, "9406269ee62b6fca6193de11b14bfd50f194ffe7120be693dd044d352b9893d121950ad63f264cf0676363badebfb03b4e914d34b503abdf5515337ca15a95220347e4f21aaf0f3d9bee54868395443b1e12a03f3737b3a6133998e7d2caaacd44be4dcd7b6274f4f5dbcd4a9077a7feda9240546cc66e00f4d374866d069f1b"}) bind$x25(r6, &(0x7f0000000080), 0x12) 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc0045878, &(0x7f00000001c0)) 12:22:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x7fffffff}}, 0x18) accept$netrom(r0, 0x0, 0x0) 12:22:05 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x200001, r4, 0x0, 0x2, 0x4}}, 0x20) 12:22:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, r3}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r5, 0x89eb, &(0x7f0000000000)={0x7ff, 0x1, 0xcae, 0x1, 0x7e, 0x16, 0x12, '\a(=\n\a\x00', "861e21df808b0587c471a88373e33a5b62f70514"}) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x80180, 0x0) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f00000000c0)={0x6e, "9406269ee62b6fca6193de11b14bfd50f194ffe7120be693dd044d352b9893d121950ad63f264cf0676363badebfb03b4e914d34b503abdf5515337ca15a95220347e4f21aaf0f3d9bee54868395443b1e12a03f3737b3a6133998e7d2caaacd44be4dcd7b6274f4f5dbcd4a9077a7feda9240546cc66e00f4d374866d069f1b"}) bind$x25(r6, &(0x7f0000000080), 0x12) 12:22:05 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:05 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4(r0, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80, 0x800) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc008240a, &(0x7f00000001c0)) 12:22:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x3c9100, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), r3, 0x2}}, 0x18) 12:22:05 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x200001, r4, 0x0, 0x2, 0x4}}, 0x20) 12:22:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x40, 0xec, {"9ed7dea990e3caa33313374b36d3bc22"}, 0xcc, 0x7f, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x800007, @loopback, 0xfffffffd}, r4}}, 0xb) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x3, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x17b) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r6, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x8, "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", 0x7a, 0x0, 0x4, 0x3, 0x3, 0x1, 0x95}}}, 0x128) 12:22:05 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc0189436, &(0x7f00000001c0)) 12:22:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x81, 0x2, 0x2, 0x40, @dev={0xfe, 0x80, '\x00', 0x10}, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x7880, 0x1, 0x8, 0x5}}) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000c40)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x2b, 0x8, 0x1, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x10, 0x20, 0x5, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x5, 0x5, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x20, 0x8000, 0x23, 0xb}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000300)={0x89c, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x2, 0x81, 0x3, 0x40}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x9, 0x4, 0x7, 0x741}]}}}]}}, {{0x8}, {0x14c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x1, 0x7, 0x9}, {0x8000, 0x0, 0x1, 0x1ff}, {0x9, 0x3, 0x8, 0x400}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xdc}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r3}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xf4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6d5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x114, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x7, 0xff, 0x7f, 0x6}, {0x3, 0x8, 0x7}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x89c}, 0x1, 0x0, 0x0, 0x20008000}, 0x20044801) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:22:05 executing program 0: bind$x25(0xffffffffffffffff, &(0x7f0000000000), 0x20000012) 12:22:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0x9, 0xfff, "ba4884ff16e304feb2be7477772bc0a76bdc0a961c4829cb81e04376c17ae667a5de779cc94fd38014c08dc15da6cd5b507d06a709f1026a793073513f84ba025adb72450909cea695ce3bf66808692c9b066fdb2348128ca78454f3696876568ad5f73f3a4bdb1d36d2a74bd0c3e7053e484e06c025b59b4ae1d762f028f42eb4ed4462368c146f2fe8064bc44fc79389eb983b02436da3d2e53e2f77836cde867bd203c37486d1d68ea0ec80ac24187c697c667cd6c509606b27740a8e99a42df83f035dc1e858cfd3a039de1b85a0c6de3a2bce1c99122ea917888a4b5aa691c3ee1bf2afc60fce9a923c6010744bc2f17df694042176489a0bdce1f99c54", 0x5, 0x2, 0x9, 0x4, 0x40, 0x4, 0xa5}}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r4}}, 0x18) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 12:22:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000040)={0x4b, "cf323ed647a1a1a4f253f67ee06c2bc89d9eef07e4c3651d6707670b25fdf3a3143f4f78675efcfa5192482cb11e15baa868e90f7539e409c581e8a2ece1ee31cd3455180c2c4398e85ac0d827a974a6367132a887155186ba06ac0879a551c2f24affad0ca0da36cded58c8ae02a42f9fb14607a2319d2a12331c84266c0e02"}) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000100)=0x1, 0x4) 12:22:06 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc020660b, &(0x7f00000001c0)) 12:22:06 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000800}, 0x1000) syz_init_net_socket$x25(0x9, 0x5, 0x0) 12:22:06 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc0189436, &(0x7f00000001c0)) 12:22:06 executing program 1: r0 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r5, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x6b, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x81}}}, 0x90) 12:22:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x3, {0x1c, 0x1ff, "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", 0x80, 0x78, 0xfd, 0x7f, 0x20, 0x1f, 0xf6}, r10}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x4, 0x0, [0x1, 0x800, 0x80000001, 0xc1, 0x5, 0x2, 0x9, 0x7, 0x7, 0x3f, 0x41bc, 0x9, 0x10001, 0xb802, 0xb8a, 0xfffffffd]}, {0x34, 0x0, [0x6, 0x965, 0x1000, 0xffff, 0xec, 0x7fff, 0x1, 0x1, 0xfffffff7, 0xfffffffb, 0x101, 0x7, 0x6, 0x3f, 0x5e29, 0x7]}, {0x30, 0x0, [0x6, 0x7f, 0x80000007, 0x6, 0x81, 0x223, 0x10001, 0x4, 0x1000, 0x7, 0x5, 0x9, 0x2, 0xfffffffc, 0x800, 0x7]}, {0x34, 0x0, [0x100, 0x10004, 0x0, 0x80000000, 0xffffffff, 0x70, 0x7, 0x401, 0x7d79, 0x5, 0x7f, 0x3ff, 0x80000001, 0xf88, 0x4, 0x4]}], r7, 0x1, 0x1, 0x120}}, 0x20) 12:22:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) accept$netrom(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 12:22:06 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x80800) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000080)={0x7, 0x7f}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x81, 0x2, 0x2, 0x40, @dev={0xfe, 0x80, '\x00', 0x10}, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x7880, 0x1, 0x8, 0x5}}) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000000c40)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x56}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x2b, 0x8, 0x1, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x10, 0x20, 0x5, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x5, 0x5, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x20, 0x8000, 0x23, 0xb}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000300)={0x89c, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x2, 0x81, 0x3, 0x40}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x9, 0x4, 0x7, 0x741}]}}}]}}, {{0x8}, {0x14c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x1, 0x7, 0x9}, {0x8000, 0x0, 0x1, 0x1ff}, {0x9, 0x3, 0x8, 0x400}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xdc}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r3}, {0x1a8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xf4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6d5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x114, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x7, 0xff, 0x7f, 0x6}, {0x3, 0x8, 0x7}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x89c}, 0x1, 0x0, 0x0, 0x20008000}, 0x20044801) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:22:06 executing program 0: getpid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) getegid() 12:22:06 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x408400, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200), r1) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c0001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) 12:22:06 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) accept4$ax25(r3, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @rose, @null, @null, @default, @null, @default, @rose]}, &(0x7f0000000240)=0x48, 0x800) connect$x25(r1, &(0x7f0000000740), 0x12) accept4$x25(r0, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x80000) accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0xc0800) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) ioctl$SIOCX25GFACILITIES(r4, 0x8912, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xfffffffffffffff9) 12:22:06 executing program 4: r0 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x244, r0, 0xd01, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0x228, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x400, 0xa5, 0x81, 0x3}, {0x8000, 0x5, 0x4, 0x4}, {0x3, 0x6, 0x5, 0x7fff}, {0x0, 0x40, 0x80, 0x4}, {0x9, 0x3, 0x1, 0x8}, {0x7f, 0x2, 0x6, 0x7fff}, {0x0, 0x5, 0x1f, 0xff}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}]}, 0x244}, 0x1, 0x0, 0x0, 0x8010}, 0x4000094) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000540), 0x608600, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4080}, 0x8080) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5ebfe1e715c9a8", @ANYRES16=0x0, @ANYBLOB="020027bd7000fbdbdf2503000000050003005c0000000400050006000a004e200000060001004e2400000400050008000b00", @ANYRES32=0x0, @ANYBLOB="0500040002000000050003002c0000000800080000000000050004004c000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 12:22:06 executing program 0: memfd_create(&(0x7f0000000040)=']-*\x8d!\x00', 0x2) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xbf78de0f6c6b090e}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x4000) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000140)={0x0, 0x6}) bind$x25(r0, &(0x7f0000000000), 0x20000012) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000080)={0x2e, "33c61d242cc5b65b73a886bb6aa8d89c49cb6d05384a72aaf0b4ee870e2c9bbf92fc37f3e027bc99f19c57b4f8223b560b6bc6c1db2332eed63547a44368fab3288bea9bee497e0080000084a00008ace8da5036345fc018ec19f4f668f2bdf8257827db527abc8b2ec78f87bef9f308a203f4890091aa1d790b870a3035dbab"}) connect$x25(r0, &(0x7f0000000180)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) 12:22:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0xfffffffffffffd6b, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x1010c0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), 0xffffffffffffffff, 0x5}}, 0x18) 12:22:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x3, {0x1c, 0x1ff, "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", 0x80, 0x78, 0xfd, 0x7f, 0x20, 0x1f, 0xf6}, r10}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x4, 0x0, [0x1, 0x800, 0x80000001, 0xc1, 0x5, 0x2, 0x9, 0x7, 0x7, 0x3f, 0x41bc, 0x9, 0x10001, 0xb802, 0xb8a, 0xfffffffd]}, {0x34, 0x0, [0x6, 0x965, 0x1000, 0xffff, 0xec, 0x7fff, 0x1, 0x1, 0xfffffff7, 0xfffffffb, 0x101, 0x7, 0x6, 0x3f, 0x5e29, 0x7]}, {0x30, 0x0, [0x6, 0x7f, 0x80000007, 0x6, 0x81, 0x223, 0x10001, 0x4, 0x1000, 0x7, 0x5, 0x9, 0x2, 0xfffffffc, 0x800, 0x7]}, {0x34, 0x0, [0x100, 0x10004, 0x0, 0x80000000, 0xffffffff, 0x70, 0x7, 0x401, 0x7d79, 0x5, 0x7f, 0x3ff, 0x80000001, 0xf88, 0x4, 0x4]}], r7, 0x1, 0x1, 0x120}}, 0x20) 12:22:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x5, @mcast2, 0x9}}}, 0x90) 12:22:06 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) accept4$x25(r0, 0x0, &(0x7f0000000240), 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000000c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), r0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010100}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x58}, 0x1, 0x0, 0x0, 0x400c014}, 0xdaf0b2d85fbdd502) 12:22:06 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 12:22:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x800000, 0x0) 12:22:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x3, {0x1c, 0x1ff, "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", 0x80, 0x78, 0xfd, 0x7f, 0x20, 0x1f, 0xf6}, r10}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x4, 0x0, [0x1, 0x800, 0x80000001, 0xc1, 0x5, 0x2, 0x9, 0x7, 0x7, 0x3f, 0x41bc, 0x9, 0x10001, 0xb802, 0xb8a, 0xfffffffd]}, {0x34, 0x0, [0x6, 0x965, 0x1000, 0xffff, 0xec, 0x7fff, 0x1, 0x1, 0xfffffff7, 0xfffffffb, 0x101, 0x7, 0x6, 0x3f, 0x5e29, 0x7]}, {0x30, 0x0, [0x6, 0x7f, 0x80000007, 0x6, 0x81, 0x223, 0x10001, 0x4, 0x1000, 0x7, 0x5, 0x9, 0x2, 0xfffffffc, 0x800, 0x7]}, {0x34, 0x0, [0x100, 0x10004, 0x0, 0x80000000, 0xffffffff, 0x70, 0x7, 0x401, 0x7d79, 0x5, 0x7f, 0x3ff, 0x80000001, 0xf88, 0x4, 0x4]}], r7, 0x1, 0x1, 0x120}}, 0x20) 12:22:06 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair(0x6, 0x5, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$x25(r1, &(0x7f0000000740), 0x7) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0x10000007, 'veth0_to_bridge\x00'}) 12:22:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f00000009c0)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=ANY=[@ANYBLOB="1c070000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcdbdf25040000000600020001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x8810) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r2, 0x311}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x3, 0x7, 0x3ff, 0x14, @empty, @loopback, 0x80, 0x20, 0x7f21, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x2f, 0x11, 0x81, 0x4, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x29}, 0x700, 0x8, 0x5, 0x1}}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000008c0)={&(0x7f0000000000), 0xc, &(0x7f0000000880)={&(0x7f0000000ec0)={0x65c, r2, 0x2, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x148, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xbe}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0xffffffffffffff07}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r5}, {0x80, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0xffff, 0x1, 0x3, 0x8}, {0x400, 0x3, 0x6, 0x4}]}}}]}}, {{0x8, 0x1, r6}, {0x158, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x0, 0x1, 0x3, 0x8000}, {0x20, 0x1, 0x9, 0x100}, {0x200, 0x7, 0x5}, {0x4, 0x40, 0x7f, 0x60}, {0x1, 0x86, 0x3, 0x7}]}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0xd89, 0x40, 0x3, 0x7}, {0x5, 0x1f, 0x7, 0x5}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8, 0x9, 0x1, 0xfffffffc}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x1d4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100000}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x8, 0x81, 0x3, 0x7}, {0x2, 0x7f, 0x7, 0x7}, {0x1, 0x1, 0xff, 0x8269}, {0x100, 0x9, 0x3, 0x7}, {0x7, 0xe0, 0x0, 0x7d9}]}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2b}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x65c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000dc0)={'syztnl2\x00', &(0x7f0000000d40)={'syztnl0\x00', r6, 0x2f, 0x80, 0x2, 0x7, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1, 0x8000, 0x1, 0x8, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000000e80)={'syztnl1\x00', &(0x7f0000000e00)={'syztnl0\x00', r6, 0x2f, 0x3, 0x28, 0x48, 0x31, @private2, @remote, 0x20, 0x40, 0x81, 0x3}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001580)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000001640)={'syztnl1\x00', &(0x7f00000015c0)={'ip6tnl0\x00', r6, 0x4, 0x0, 0x1, 0x7, 0x2, @private1, @remote, 0x80, 0x8, 0x7, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000001700)={'ip6_vti0\x00', &(0x7f0000001680)={'ip6_vti0\x00', r5, 0x29, 0x18, 0x0, 0x0, 0xc, @loopback, @mcast1, 0x1, 0x10, 0x8, 0x80000001}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000017c0)={'syztnl0\x00', &(0x7f0000001740)={'ip6gre0\x00', r6, 0x2f, 0x4, 0x8, 0x3f, 0x40, @private0, @mcast2, 0x7, 0x40, 0x10000, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000001880)={'ip6_vti0\x00', &(0x7f0000001800)={'syztnl0\x00', r5, 0x4, 0x3, 0x21, 0x5, 0x1, @rand_addr=' \x01\x00', @loopback, 0x40, 0x1, 0x0, 0x2}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000021c0)={&(0x7f00000018c0)=ANY=[@ANYBLOB="d8080000", @ANYRES16=0x0, @ANYBLOB="000127bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="7400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000200000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff07000008000100", @ANYRES32=r6, @ANYBLOB="9c01028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000014000400050000030400000000003e803f0000006c00010000000100656e61626c65640000000000000000000000000000000000000000000000000000000300060000000000040000000600", @ANYRES32=0x0, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d000074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000004400040004000007050000000101213fff5e0000a412d88000000000fb08a4ed070000001700010909000000000108080000000006002003010000000900577f0600000008000100", @ANYRES32=r6, @ANYBLOB="f00002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400190f000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="1401028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b0000000800040087bc000008000600", @ANYRES32=r7, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="5c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c0004000700007fff0000000600070401000000060001fc0700000080003f08e50000000101ff4e877c00003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="8800028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004006b0000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000001c00040000000840008000000800d7000100008007000160fdffffff08000100", @ANYRES32=r9, @ANYBLOB="680202803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400163a000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000300000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f696400000000000000000000000000000000000000000000000005000300030000003e0004000600000008000600", @ANYRES32=r5, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400c003000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000080000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000500000040000100ecfc010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000004000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="0400028008000100", @ANYRES32=r5, @ANYBLOB="fc00028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r12, @ANYBLOB="0800070000000000400001002400010071756575655f694e0000000000000000000000000000000000000000000000000500030800000000000000000800000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400a03c000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000500000008000600", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="7800028038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400050000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB], 0x8d8}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) 12:22:06 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3ff}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x59}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000040}, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000200)={'ip6gre0\x00', 0x0, 0x13, 0x2, 0x2, 0x56, 0x13, @ipv4={'\x00', '\xff\xff', @loopback}, @empty, 0x20, 0x10, 0x8, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x81, 0xfffffff7, 0x0, @mcast1, @ipv4={'\x00', '\xff\xff', @loopback}, 0x88, 0x7821, 0x5b1, 0x100}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0xc5, 0x466a, 0x29, @dev={0xfe, 0x80, '\x00', 0x13}, @mcast2, 0x7800, 0x8, 0x6, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000008c0)={'ip6gre0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2b, 0x81, 0x4d, 0x5, 0x0, @mcast1, @loopback, 0x40, 0x1, 0xfff, 0x1}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000980)={'ip6gre0\x00', &(0x7f0000000900)={'syztnl0\x00', 0x0, 0x4, 0xa1, 0x6, 0x3ff9, 0x0, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x8000, 0x0, 0x1}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001580)={&(0x7f00000009c0)={0xb8c, r1, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xcbc}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r3}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x250, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xf354}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0x194, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xda31}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x110, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xfe01, 0x1, 0x7f, 0x3ff}, {0x9, 0x20, 0x7, 0x1}, {0x0, 0x8, 0x1, 0x4}, {0x9, 0x80, 0x8, 0x8001}, {0x8, 0x5, 0x80, 0x3f}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x400}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0x248, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xa51e, 0x1b, 0x4, 0xfa1}, {0x1, 0x8, 0xf9, 0x2}, {0x4, 0xfc, 0x81, 0x846}, {0x9, 0x8, 0x5, 0xa87f}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9d8b}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x39}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0xb8c}, 0x1, 0x0, 0x0, 0x200400c0}, 0xc044) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) sendmsg$FOU_CMD_DEL(r8, &(0x7f0000001600)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x28, 0x0, 0x300, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @empty}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x80) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r10, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_SESSION_CREATE(r10, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80108}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x8001}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000080}, 0x40) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) sendmsg$FOU_CMD_GET(r10, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x58, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x62}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x80) 12:22:06 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) syz_init_net_socket$x25(0x9, 0x5, 0x0) 12:22:07 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000002c0)) connect$x25(r0, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000440)=0x1, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000005c0), 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0xb0, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x1, r2, 0x1c, 0x1, @ib={0x1b, 0xfff, 0x3f, {"9e88294f4f9828e89fd4f6a28e5cf76f"}, 0x4000, 0x7, 0x400}}}, 0xa0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r6, &(0x7f0000000580)={0x11, 0x10, 0xfa00, {&(0x7f0000000540), r5}}, 0x18) socket$nl_rdma(0x10, 0x3, 0x14) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000240), 0x0, r2, 0x10, 0x1, @in6={0xa, 0x4e20, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}}, 0xa0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000480)) 12:22:07 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0xffff, 0x0, 0x4296, 0x3, 0x7, 0x1c, 0xd, "e9edd9391061f3230c98e38ebbca1aa5175ce8c2", "c9a863e3b012d7139c4ca9a6562a625392bac42b"}) 12:22:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x800000, 0x0) 12:22:07 executing program 4: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xa933) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) r3 = accept4$bt_l2cap(r1, &(0x7f0000000200), &(0x7f0000000240)=0xe, 0x80800) accept4$bt_l2cap(r3, 0x0, &(0x7f00000002c0), 0x800) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100), r2, 0x0, 0x1, 0x4}}, 0x20) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@null, 0x5, 'gre0\x00'}) 12:22:07 executing program 1: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @bcast}, [@remote, @netrom, @default, @bcast, @bcast, @bcast, @null, @bcast]}, &(0x7f0000000080)=0x48, 0x80000) socket$inet_udp(0x2, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 12:22:07 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000880)={0x81, 0x80}) 12:22:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x1}}, 0x18) 12:22:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x800000, 0x0) 12:22:07 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x1000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x40, 0x2, 0x40, @mcast1, @private0, 0x40, 0x80, 0x383e, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000400)={'sit0\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x4, 0x3f, 0x81, 0x3f, 0x40, @remote, @remote, 0x20, 0x40, 0x30000000, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000780)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000740)={&(0x7f00000004c0)={0x250, r1, 0x2, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x985}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x250}, 0x1, 0x0, 0x0, 0x40}, 0x8004) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r6, &(0x7f0000000000), 0x20000012) 12:22:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendto$ax25(r1, &(0x7f0000000040)="5b9dd9d01ba28a361a3a022300d3cbf8adcf98e216f184c2b7fd9f3f60cb754159df78d23dd802eada12f57a89275b68518b849ef6a6c17b0e6a07edf4731e7a14343b373581433feb8c0bc8a4302755b3edd58939823766bf23c3ce53e700de", 0x60, 0x2008804, &(0x7f00000000c0)={{0x3, @bcast, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) accept$netrom(r0, 0x0, 0x0) 12:22:07 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) accept4$x25(r3, &(0x7f00000003c0), &(0x7f0000000400)=0x12, 0x80800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e23, 0x800, @local, 0xff}}}, 0xa0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000002c0)=0xbd34) 12:22:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x800000, 0x0) 12:22:07 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0xf, 'netpci0\x00'}) bind$x25(r0, &(0x7f0000000000), 0x12) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:22:07 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f00000000c0)=0x4, 0x4) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x6, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @local}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004880}, 0x5) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) accept$netrom(r5, 0x0, 0x0) 12:22:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:07 executing program 2: ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000000)={0x7a, 0x3, 0x6, 0x6, 0x2}) fcntl$getown(0xffffffffffffffff, 0x9) 12:22:07 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) connect$x25(r1, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) accept4$x25(r1, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x800) 12:22:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, 0xfffffffffffffffd, 0x13f, 0x9}}, 0x20) 12:22:07 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f00000000c0)=0x80, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) syz_genetlink_get_family_id$team(&(0x7f0000000140), r0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x40080, 0x0) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'lo\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040805}, 0x40000) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000000)={0x4c}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r3, 0x0, 0x0) 12:22:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:07 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000000)=0x21, 0x4) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:07 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) socketpair(0x29, 0x2, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, r2, 0xd68f6a9ca1373d8b, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'team0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x3}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x24000010) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r2, 0x2, "7ea3a2", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socketpair(0x21, 0x1, 0x9, &(0x7f0000000000)) accept$netrom(r0, 0x0, 0x0) 12:22:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:08 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000040), 0x12) 12:22:08 executing program 2: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x7ff}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x11) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macsec0\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x50}, 0x1, 0x0, 0x0, 0x2400c004}, 0x20000000) socket$l2tp6(0xa, 0x2, 0x73) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) syz_genetlink_get_family_id$fou(&(0x7f0000000080), r1) 12:22:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x4, 0x7, 0x0, @local, @ipv4={'\x00', '\xff\xff', @empty}, 0x700, 0x7, 0x3a, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x29, 0xe0, 0x5, 0xffff, 0x1c, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @private2, 0x80, 0x8000, 0x401, 0x6}}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:08 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000040), 0x12) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x4b6883, 0x0) write$vga_arbiter(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/292], 0xd) 12:22:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x64, 0x140f, 0x200, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'smc_ib\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'umad\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xa, 0x45, 'ipoib\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xc, 0x45, 'ib_srpt\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xb, 0x45, 'uverbs\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x200480c0) 12:22:08 executing program 2: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r2, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0xb, 'batadv0\x00'}) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) 12:22:08 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) getsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r0}}, 0x20) 12:22:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x1c1000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x0, 0x5, 0x0, 0x2, 0x20, @mcast1, @remote, 0x700, 0x40, 0x4, 0x3a3}}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@caif=@dbg, &(0x7f00000000c0)=0x80, 0x400) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x5, 0x0, 0x10, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x10, 0x8000, 0x0, 0x7fff}}) r4 = accept4(r2, &(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast2}}, &(0x7f0000000500)=0x80, 0x80800) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000600)={'ip6_vti0\x00', r1, 0x29, 0x3f, 0xe0, 0x0, 0x1a, @rand_addr=' \x01\x00', @loopback, 0x700, 0x0, 0x0, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000540)={'syztnl1\x00', r5, 0x29, 0x6, 0xff, 0x7, 0x1, @private2, @rand_addr=' \x01\x00', 0x80, 0x80, 0x9, 0x2}}) sendmsg$nl_route(r2, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=@mpls_getroute={0x78, 0x1a, 0x400, 0x70bd27, 0x25dfdbfe, {0x1c, 0x20, 0x80, 0x2, 0xfe, 0x0, 0x0, 0x12}, [@RTA_TTL_PROPAGATE={0x5, 0x1a, 0x4}, @RTA_VIA={0x14, 0x12, {0x9, "4f7e4114d9b281ba8f7de05f1209"}}, @RTA_MULTIPATH={0xc, 0x9, {0xfffd, 0x0, 0x0, r3}}, @RTA_MULTIPATH={0xc, 0x9, {0x43, 0x21}}, @RTA_MULTIPATH={0xc, 0x9, {0x8, 0x4, 0x99}}, @RTA_VIA={0x14, 0x12, {0x3, "9386f40f8b89d69e79c0dbb34fa9"}}, @RTA_DST={0x8, 0x1, {0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r6, &(0x7f0000000000), 0x20000012) syz_open_dev$admmidi(&(0x7f0000000280), 0x5, 0x4880) r7 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r7, 0x89ec, &(0x7f0000000140)={0x0, 0x3}) 12:22:08 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$midi(r0, &(0x7f0000000140)="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"/312, 0xfffffffffffffe2c) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) 12:22:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r4, 0x3e}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000240), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x4902) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) fcntl$getownex(r5, 0x10, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:08 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x3, {0x2, 0xfffffff8, "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", 0xd, 0x7f, 0x0, 0xff, 0x4, 0x1}, r3}}, 0x128) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x8912, &(0x7f00000001c0)) 12:22:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r0}}, 0x20) 12:22:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_newaddrlabel={0x50, 0x48, 0x400, 0x70bd2b, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x0, 0x0, 0x8}, [@IFAL_LABEL={0x8, 0x2, 0x2}, @IFAL_LABEL={0x8, 0x2, 0x7}, @IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_ADDRESS={0x14, 0x1, @empty}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:08 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000), 0x80000000, 0x800) 12:22:08 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 12:22:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0), 0x200, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x80, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'vxcan1\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}]}, 0x80}, 0x1, 0x0, 0x0, 0x20}, 0x4) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f0000000080)={0x35, "0df797442f3b51a2fcc685b27dbac7968f43f883689825510272d88e3434d83a36e7cee57d2405ab8db0fa8afe79cc1beacb2837856e2dce124bba550bec5f7a354e22b6265dc983ef85858cff3a2b9dd843ee71de6859d54536bf03a29e2adf55d3a9f2a229b27da3ae1d31851dbed2445018317258c84a75c320112c395a1b"}) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) bind$x25(r2, &(0x7f0000000000), 0x20000012) 12:22:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r0}}, 0x20) 12:22:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "98c06d", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:08 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x60bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8000010}, 0x0) 12:22:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 12:22:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:08 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000040)={0x58, 0x6800, 0x7, 0xc, 0x7, 0x84}) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) recvmsg$can_bcm(r1, &(0x7f0000000300)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000000080)=""/10, 0xa}, {&(0x7f00000000c0)=""/237, 0xed}, {&(0x7f00000001c0)=""/100, 0x64}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/150, 0x96}, {&(0x7f0000001440)=""/195, 0xc3}, {&(0x7f0000000240)}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/239, 0xef}, {&(0x7f00000002c0)=""/43, 0x2b}], 0xa}, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:08 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x12a, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x4, 0x5, "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", 0x73, 0xf, 0x72, 0x81, 0x9, 0x40, 0x1, 0x1}, r1}}, 0x120) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000380)=[{0x1e, 0x0, [0x3, 0xff, 0xff, 0x2, 0x9, 0x401, 0xfff, 0x101, 0x6, 0x1, 0x0, 0x8b9, 0xa7, 0x4, 0x3, 0x1]}, {0x18, 0x0, [0x8, 0x7fffffff, 0x8, 0x969f, 0x5, 0x6, 0x3, 0x3, 0x7f, 0x2132, 0x6, 0x1b9a, 0x101, 0xff, 0x3, 0x8]}, {0x9, 0x0, [0x0, 0x7, 0x4, 0xfffffff9, 0x3f, 0xfffffffe, 0xe21, 0x20, 0x20, 0x7, 0x4, 0x8f, 0x1d, 0x5, 0x8001, 0xcb64]}, {0x1c, 0x0, [0x7, 0xfffffff8, 0x7f, 0x1, 0x60000000, 0x3, 0x1, 0xf502, 0x4, 0x401000, 0x6, 0x7fff, 0x9, 0x80000000, 0xffffc3d8]}, {0x25, 0x0, [0x7fffffff, 0xe232, 0x6, 0x1c, 0xffffffff, 0xe22, 0x8, 0x1f, 0x4, 0x1ff, 0xf442, 0x1, 0xffff, 0xd99, 0x1000, 0x1]}], r6, 0x1, 0x1, 0x168}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:08 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4$x25(r0, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x800) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25GFACILITIES(r2, 0x8912, &(0x7f0000000040)) 12:22:08 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000240)={0x7e}) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) accept$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@remote, @remote, @netrom, @default, @netrom, @remote, @bcast, @rose]}, &(0x7f00000000c0)=0x48) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) socketpair(0x1a, 0x2, 0x1, &(0x7f0000000100)) accept$netrom(r0, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0xf6, 0x6, 0x2, 0x0, @private0, @private0, 0x7800, 0x700, 0x6, 0x1}}) 12:22:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:09 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x1262, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000040)={0x12, "7ff81ba1baab75a25d34077fccaf3c5d16593244ddeb5d53a0f09f27dc5df1c6b727f57d0e3280220d7ae7f35a9735d646a495d6d6bb814d9ae89e0b03d4b1d9d5e16c53e00245c650e9a147f19a4c6fc67f70fae2191b380dbca3e40975048a2b8c7c5d9a4b2c9204154bd3c5d584274d8789200c46bc7bcc3c1eb84fb4f666"}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000180)={0x1b}) socketpair(0xb, 0xa, 0xffffffff, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x7ff, 0x10001, 0xffffffe0, 0x6, r3, 0xc6b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x40) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x4) 12:22:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e22, @broadcast}}}, 0x90) 12:22:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:09 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'team_slave_0\x00'}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}]}, 0x48}, 0x1, 0x0, 0x0, 0x10004}, 0x4000000) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000200), 0x4) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) sendmsg$802154_dgram(r6, &(0x7f00000003c0)={&(0x7f0000000340), 0x14, &(0x7f0000000380)={&(0x7f0000000780)="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", 0x1000}, 0x1, 0x0, 0x0, 0x40045}, 0x80) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$SIOCX25GSUBSCRIP(r5, 0x89e0, &(0x7f0000000100)={'bond0\x00', 0x9, 0x1}) accept$netrom(r4, &(0x7f0000000040)={{0x3, @rose}, [@bcast, @remote, @remote, @bcast, @default, @netrom, @rose, @netrom]}, &(0x7f00000000c0)=0x48) bind$802154_dgram(r3, &(0x7f0000000000)={0x24, @none={0x0, 0x3}}, 0x14) accept$netrom(r1, 0x0, 0x0) 12:22:09 executing program 2: accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) write$midi(0xffffffffffffffff, &(0x7f0000000200)="1527f31100d4dbe08ea218faac3b497019b27f2a00962c59ec20f73d3834bc6d7e9a8dd2639ce2886d1e809923a48d04875947233b26d332660596638d8987d06aeea09a649ca4ab5a9887113f174e6d4e402c493155e7dc46032ce8e8920f02babda4a837d10aa70e71e714e69821a460ae6dae22625dbad42636a0d4fe6fcd5b4098b4123f8f914150857e7a4c861e9fc8861500000000", 0x98) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x171100, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0xa8e00, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x1) connect$x25(r1, &(0x7f0000000740), 0x12) bind$ax25(r1, &(0x7f0000000000)={{0x3, @null, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 12:22:09 executing program 0: sendto$ax25(0xffffffffffffffff, &(0x7f0000000040)="179af44f35b6dd3e9d6761e0b844707a5e9ecd6e312e9f884ccc355d9bf01669c76ff533afed947e823895bf79983bd56d41c2304788778686dbce002605ab9060e2539f76e39c6677e47f668576f33610b5553ac766c3885475dc6d63b9b4caba900adcc07bc53df611ba9fb0aed731d92a773879cf5ce9d0881349546b595ccca85fab0b5a0e394c2e29ad67d142dc61820f7a4b918470c4", 0x99, 0x20008010, &(0x7f0000000100)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000180)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x2c) 12:22:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xc040, 0x0) 12:22:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair(0x27, 0x4, 0x7, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000100)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendto$x25(r3, &(0x7f0000000380)="9a9861f575398be06b", 0x9, 0x4000, &(0x7f00000003c0), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x58002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xa, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x1d, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0xf, r4, 0x8, &(0x7f0000000140)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0x9}, 0x10, 0x0, r4}, 0x78) sendto$x25(r0, &(0x7f0000000780)="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", 0x1000, 0x40, &(0x7f0000000080)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) syz_genetlink_get_family_id$team(&(0x7f0000000440), r1) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000040)={0x44}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000200)={0x12, "1eeafcef72abd22850031ef2face812d21a776262c552c937db6689a7968a417f6a75e8e2562c39da0215d9de49b085959294f9a062068d438e4d2142998a37b99902bae32f6068d541579b82a770a45d461591fb32abc450c6a38df3a08cb96acfa475525b8b45ad85b9405a1a6af333003b91acd74e7ff88bc1e2c80994012"}) 12:22:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) [ 2142.281826][T21715] Unsupported ieee802154 address type: 0 12:22:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000600), 0x10202, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400), 0x2000, 0x0) recvmsg$can_bcm(r4, &(0x7f00000005c0)={&(0x7f0000000440)=@x25={0x9, @remote}, 0x80, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/4, 0x4}], 0x1, &(0x7f0000000540)=""/99, 0x63}, 0x61) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r3, 0x6}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) sched_rr_get_interval(0x0, &(0x7f0000000640)) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106}}, 0x20) bind$x25(0xffffffffffffffff, &(0x7f0000000000), 0x12) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r6, 0x89f5, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000380)={'syztnl0\x00', 0x0, 0x4, 0x58, 0x81, 0x16, 0x14, @private1={0xfc, 0x1, '\x00', 0x1}, @local, 0x8, 0x40, 0xc8}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) [ 2142.330437][T21715] Unsupported ieee802154 address type: 0 12:22:09 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x410000, 0x0) getuid() ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000000)={'ip6erspan0\x00', 0x3f, 0x8}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:09 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) fcntl$getown(r1, 0x9) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x224000, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080), r2) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000100)) 12:22:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x2, r3, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 12:22:09 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000040)={0x3b}) connect$x25(r0, &(0x7f0000000740), 0x12) accept$netrom(r0, 0x0, 0x0) 12:22:09 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 12:22:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, &(0x7f0000000500)={0x9, @remote}, &(0x7f0000000540)=0x12, 0x80400) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x118, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, [{{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x28}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}]}, 0x118}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000000)) 12:22:09 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:22:09 executing program 4: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x2, 0xfa, 0x4, 0x28, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x700, 0x10, 0x9, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r0, 0x29, 0x6, 0x6e, 0x7ba5, 0x62, @mcast2, @private2, 0x10, 0x40, 0x0, 0x8}}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getitimer(0x1, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:09 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) write$midi(0xffffffffffffffff, &(0x7f0000000080)="0061e8ef7a56d2ed6f14ce982181afb35901e50fcf8654655f2856f5ba4278d0d03b58a85ee81aafa50534a7012b62e60bf4640630bd9d98c9eb1255ee02284e8d04458362ad9d872c06885f8a0c5ebf4b4a7ea85ab560c05bdf0e42947dc9b60559c37001d3cc8394a2e323c6558565ce0a5bab6680684497118f0b16730c2fddde18ffee66f7c36207c2a25b206d39ae394cb5cebcd9e049c2e0e9804e50cc54785cae823e228009cda882ffa2f4e118392fa59e629aa248bb8059dde0a670", 0xc0) 12:22:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) accept$netrom(r0, 0x0, 0x0) 12:22:09 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000000)={0x73, "81ddbdde9703d490b1887ae8e7e6a7c7059cda886ab2efd242f8d902860469465077db2c04bc0e06722827d675b4a6127fb1e9e2a140994f35deef11884d5787da2d80702d3ac8e1c2369df52ad953e24751afdec4ca84fdc12eaf3f2c90df66cdbe4bcb37802e51991ad13cdb6b2a9d76f973d23c52e52e3f49860d061a89cb"}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x3, 0x401, "6be83c4ba0fad85e406aacbf68c56f423e9d64e626210a5c083b896a6eb0488ab2fd40fa242d71517e99f832fc1e95e2e1727b70b99f368283b1b990b2cd70f2aca0f66c94b4e09df3973e13aa93cf5003baf52771ce3244e9cd2258ad36a07646afb717e74f1209f4f3a3ec6fe42a8ac3f30dd8f3039339c1e254f861c76bd2310c06d6bc397125ebc99b8a8d371bc60969db94a149fc5932f71aa9fbe37898234db14c9ab775a19f41540dd290e1e1abcb7de28e24818d6402980ab740a221ea8ddf3a1fa8bf5a36fbef475bf2dbb227d6e7d418e0b119a7b8283333be39dd9b5ad7d5eae3b297bf77de911f3d15c29b492e8785dad77444a3b1431aa3ed67", 0x3, 0x9, 0x80, 0xff, 0x20, 0x72, 0x1, 0x1}}}, 0x120) socketpair(0x10, 0x1, 0x10000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$x25(r1, &(0x7f0000000080)={0x9, @remote}, &(0x7f0000000380)=0x12, 0xc0800) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x50, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}]}, 0x50}}, 0x24000894) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x64, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4e}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 12:22:09 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000140), &(0x7f0000000180)=0x4) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000100), 0xf) accept4$bt_l2cap(r1, &(0x7f00000001c0)={0x1f, 0x0, @fixed}, &(0x7f0000000200)=0xe, 0x80000) 12:22:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 12:22:10 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f00000000c0)={0x7f, 0xff}) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000100)) memfd_create(&(0x7f0000000080)=',#\x00', 0x3) 12:22:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000300)) rt_sigtimedwait(&(0x7f0000000180)={[0x8]}, &(0x7f00000001c0), &(0x7f0000000240)={r5, r6+10000000}, 0x8) 12:22:10 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = accept4$x25(r1, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = accept4(r2, &(0x7f0000000140)=@qipcrtr, &(0x7f00000001c0)=0x80, 0x0) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000200)=0x5, 0x4) connect$x25(r3, &(0x7f0000000100), 0x12) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r5, 0x89e9) ioctl$SIOCX25GSUBSCRIP(r3, 0x89e0, &(0x7f0000000240)={'team_slave_0\x00', 0xeb3, 0x5}) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x32, 0x75, 0x4000000b, 0xb, 0x4}) 12:22:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:10 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), r0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0xa5, 0x7, 0x62, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1, 0x7, 0x6, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x4, 0x4, 0xa8, 0xbf, 0x1, @private2, @mcast1, 0x7800, 0x20, 0x6, 0xd94a}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x29, 0x1f, 0x9d, 0x0, 0x2, @remote, @remote, 0x7800, 0x20, 0x7fff, 0x8001}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="e0040000", @ANYRES16=r2, @ANYBLOB="080028bd7000fbdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="dc00028064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003400040005000204ff07000001040980000200007f00012002000000ff0707048800000006001f3f800000008000f7035bf7ffff3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="8400028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040001000000080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000000000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500120003000000080004000000000008000100", @ANYRES32=0x0, @ANYBLOB="780002803800010024000100616374697665706f727400000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b750400000061626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0001028040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f61646361737400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r5, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000070000000005000300200000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000300000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="44010280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400020000004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB], 0x4e0}, 0x1, 0x0, 0x0, 0x4840}, 0x20000000) 12:22:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0x5}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x4, 0x0, [0x101, 0x5, 0x4d, 0xb3a, 0x8000, 0x4e9, 0x4, 0x3, 0xb9f, 0x1, 0xea, 0x8, 0x8001, 0x7fff, 0x9c26, 0x6fcb]}, {0x0, 0x0, [0x5, 0x2, 0x8, 0x100, 0x5, 0x0, 0x3ff, 0x80, 0x4, 0x400, 0x7, 0x0, 0x37, 0x7, 0x403, 0x6]}], r2, 0x1, 0x1, 0x90}}, 0x20) 12:22:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x111b0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r2, &(0x7f0000000040)={0x24, @short={0x2, 0x2, 0xfffe}}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x100000000) 12:22:10 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept$netrom(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:10 executing program 1: accept4(0xffffffffffffffff, &(0x7f0000000000)=@ieee802154, &(0x7f0000000080)=0x80, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:11 executing program 3: setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000040), 0x4) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000080)={0x8000, 0x6, 0x3f, 0x0, 0x1, 0x13, 0x23, "0ce70fb84435be6482753e30c0c9914cd56bd9e8", "ff48bd388607b47f9566dff3403ee95dcccd9da8"}) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) 12:22:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:11 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x0) sendto$x25(r1, &(0x7f0000000080)="ca7a61d3139aa52c9258b6f73f00df871961e488d1fc628b430617f5e5855032bfab125749a2071ebc5a8c9409510637066fd909489851057deb44747ce598bd6d7bee9423a4e7fdff62abcebb627317c9bcb46f92fb73919250868b9025b78462a27563134599eb32e46a97c2ec8a179a58fde86d0cd83b49e20d017b8bf4229730dd59880a705236f64eb1ceeb0148208d113ff8f35a5c0c503597979b84475405710f307788eb2ae959375ccb15d089d590", 0xb3, 0x0, &(0x7f0000000140), 0x12) 12:22:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e21, @private=0xa010102}}}, 0x90) 12:22:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000300)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x13f, 0x4}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x2}}, 0x2b) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r3, 0x5}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfff, @empty, 0xb}}}, 0x30) 12:22:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:11 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) sendto$ax25(r0, &(0x7f0000000100)="07b377217f6e37bd20a63a29652f4f9ef9c14757c018851d90727896e763ceab947c0fbbfc4efb0b6ab750f425f4dcf332950d33e75694c47ab34095b76eeb273c1e10d7d04d7a87403e8d062864674af31d5c563418054e64d1d4a57f0266bd56be8b65ff73d8df0d4574de04bb984fc49d3acb7906e5ed607f5e8f2bd3018b1112c2098510bdc9705111405c5d3d6393401eb672cb82174dc0430addfb451c775fd5c55970c13e87669085a4c9eee4e0eff369e466a8abebd315da8bd9f7705902235554f0c9bce5ea604f9d234e45b685d9aaf545b13a7357abcbcc19aea653e41283676f2cbf67f94ccf33c5053fd7d30ad74f01a1d9", 0xf8, 0x40000, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast, @null]}, 0x48) syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0), 0x140840, 0x0) r2 = accept4$x25(r1, &(0x7f0000000300)={0x9, @remote}, &(0x7f0000000340)=0x12, 0x800) connect$x25(r2, &(0x7f0000000280), 0xc) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) accept4(r3, 0x0, &(0x7f0000000080), 0x800) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) accept$netrom(r4, 0x0, 0x0) 12:22:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18}, 0x20) 12:22:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:11 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x280001, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f00000000c0)={0x46, "c5309808f635c4616f47347db6edece787bb77b05f7d306db3d40dfeb242245f5c31acaf2d9045cd02856c319369396c29386a1d92f7d8a18713624abf9a19604e406eeac55a0b47a97bb7e645d87a11ea64bf6b764d6d0fc6ed6a6a889182586a5e3f91daf0175547a0000c60a6e9b63b65041009c96a012443c046060c3374"}) connect$x25(r1, &(0x7f0000000740), 0x12) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) ioctl$SIOCX25GFACILITIES(r3, 0x8912, &(0x7f0000000080)) 12:22:11 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000540)) connect$x25(r0, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x7, @loopback, 0x112}}}, 0x30) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) accept4$x25(r0, &(0x7f0000000580)={0x9, @remote}, &(0x7f00000005c0)=0x12, 0x800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000640)={0x1, 0x10, 0xfa00, {&(0x7f0000000600), r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x80, 0x20, "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", 0x20, 0x5, 0x8, 0x2f, 0x9, 0x7, 0x80, 0x8}, r5}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r8, 0xe0, "aa3a91", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0xfffffffffffffdb7) 12:22:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000300)) rt_sigtimedwait(&(0x7f0000000180)={[0x8]}, &(0x7f00000001c0), &(0x7f0000000240)={r5, r6+10000000}, 0x8) 12:22:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:11 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x6, 0x6, 0x20, 0x9, 0xc, @rand_addr=' \x01\x00', @private2, 0x8, 0x20, 0x1c0000, 0x5}}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) accept4(r2, &(0x7f00000002c0)=@generic, &(0x7f0000000200)=0x80, 0x80000) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'sit0\x00', r1, 0x4, 0x0, 0x9, 0x0, 0x40, @dev={0xfe, 0x80, '\x00', 0x30}, @mcast2, 0x8000, 0x80, 0x75, 0x2}}) r3 = accept4$x25(r0, &(0x7f0000000240), &(0x7f0000000280)=0x12, 0x80800) ioctl$SIOCX25GFACILITIES(r3, 0x8912, &(0x7f00000001c0)) 12:22:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r5, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040), r2, 0x0, 0x1, 0x4}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x14000, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r8, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x7f, 0x3d, 0x1f, 0x61, 0x5, 0x9, 0x9, 0x1}, r9}}, 0x120) 12:22:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0xa3, 0x4, 0x6, 0x2, @ipv4={'\x00', '\xff\xff', @empty}, @mcast1, 0x8000, 0x10, 0x7fff, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl2\x00', r2, 0x2f, 0x3f, 0x0, 0x9, 0x24, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2f}}, @mcast2, 0x8, 0x700, 0x7fff}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', r3, 0x29, 0x7, 0x6, 0x1000, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x8000, 0x80, 0x7ff, 0x80}}) socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:11 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000580)={'syztnl0\x00', &(0x7f0000000500)={'ip6tnl0\x00', r1, 0x2f, 0x7, 0x0, 0x226, 0x11, @mcast2, @loopback, 0x7, 0x8000, 0x763f, 0x4}}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xbc3790f562bc97e6}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7f}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xcf}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xffe1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20}, 0x24008080) connect$x25(r2, &(0x7f0000000740), 0x12) bind$x25(r2, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) sendto$x25(r0, &(0x7f0000000400)="162893f213041f5effe6694dd3953e0152b6884af409ac88be0809bc77c961fdf3431993ceb4c5bdb1b75caba032fffc7fcfce6e2110131295bca01eb128b3d2c173334994", 0x45, 0x0, &(0x7f00000004c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) r3 = accept4(r2, &(0x7f0000000200)=@tipc=@name, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x2f, 0xff, 0xb1, 0x5, 0x6e, @mcast1, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1e}}, 0x7800, 0x7, 0x3, 0xfc000}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'syztnl0\x00', r4, 0x4, 0x81, 0x3, 0x8, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x3c00, 0x8, 0x66, 0xa42}}) 12:22:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x1, {0x7f, 0x0, "7286d82301b26938ece6d8bab5ac3796248e4ef89007d8a383d755faba4a4684a2f9bbad29b33a5b30b70d400c459ec61f7683b6b0466dd757255330de706bc008f3b20e8f1cbcfd93e33fb26425e5683c9ff25077da499658f704b5db03a28647dc6ea80469fa71ca75e09b6b571855444c75943279f2e82b0b5383c4d584fa5a930c854edd2258c143ca2e8418e079ebe366d4476bccd3adc33d30689cdcbd41295acf52152ea28d4e61fb66055593535ff0ae7508c68d7f8610652db4483b90d06389e03b03a12dc552104584d61693eebf44a8410a12cdd587827ef3e2fa10beafd6649033eb76d5556f0d9bb397617db5134ef29763a6c24e1dd300fc00", 0x5, 0x7, 0x7, 0x4, 0x20, 0x0, 0x1f, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) 12:22:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000300)) rt_sigtimedwait(&(0x7f0000000180)={[0x8]}, &(0x7f00000001c0), &(0x7f0000000240)={r5, r6+10000000}, 0x8) 12:22:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:12 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendto$x25(r0, &(0x7f0000000000)="2df10a7367832e12fbefedadff0948ad01d4e5a473376dc9f3cbad29a5ce711c1b53fdf97f46c0423168ac233c3295d8610f0ba21bb7cf270b9e2d455e2d095d8db23bbcbe61fb8a8432d25ca857adeb30d5860c74faf25f1e45874e5f9a23b83addefd66715bce4f1ad8dd31a40a9a1027a4e5d935120c9b338e57840ca361a6bc34db401e3dc9493d69302c1e7193139807100e562fa2406626110dc3585f7f4ab04825bd5c523", 0xa8, 0x881, &(0x7f00000000c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getroute={0x14, 0x1a, 0x2, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000014}, 0x4) select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x7}, 0x0) select(0x40, &(0x7f0000000100)={0x7, 0x80000000, 0x3, 0x1000, 0x4, 0x23a, 0x3, 0x200}, &(0x7f0000000140)={0x7, 0x7fff, 0xffff, 0x9c, 0x6, 0x7fff, 0x100000, 0xe6}, &(0x7f0000000180)={0x81, 0x1, 0xfffffffffffffff7, 0x80000001, 0x20, 0xfffffffffffffffc, 0x32, 0x8}, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:12 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) write$sysctl(r1, &(0x7f0000000040)='1\x00', 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7fff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="05000000000000000000000000000000000000000008000000000000"]) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:12 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 12:22:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:12 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) r1 = geteuid() socketpair(0x1, 0x6, 0x400, &(0x7f0000000000)) getuid() r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x400000, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYRESHEX=r1, @ANYRES32=r2, @ANYBLOB="feff0000fc0100000000000000000000000000004b00060058bc137d6379000017000000080000000000060008e9ff00080000000300000008000000"], 0x18}, 0x1, 0x0, 0x0, 0x20040005}, 0x4001) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000001c0)=0xc) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000300)) rt_sigtimedwait(&(0x7f0000000180)={[0x8]}, &(0x7f00000001c0), &(0x7f0000000240)={r5, r6+10000000}, 0x8) 12:22:13 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000000)={'veth1_vlan\x00', 0x0, 0x100}) 12:22:13 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 12:22:13 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x20080, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_PW_TYPE={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0xc087) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000000)={0x9, 0x108, 0xfa00, {r4, 0x80, "472edc", "7d1757bd928306f462bac168860f73fe420a76782d02464c5a95da771112c2a32f112df90001dc51468f89243b40a83f6dca5973e9af402c5d831c6efbeb93939e6d555c02fd93d4b5cc765f9cba78dc88e0d9a0d61122478d56ad6e4f8caf234ca3182564f49ef80da3429816cae5b74e203b0596758bf42520888b7c0a78cb1ce2bfe31ffab317416f2912da3d08383c67443c0a3b3578252bc6eab2bee9650df3f99e56037c674164b439f43a03d19b5cd56cfa0e7bd0575eaa8fc41d033fddba8dfeed8c16cb94b40aae97484bec6a6e48a5481587cf2263ce17ea466f526da9e0174f8054511229328e8748e4ab519b075639e805fe085ff40ac1d512fd"}}, 0x110) 12:22:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:13 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) 12:22:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:13 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 12:22:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000000)={0x69, "6b7a5f188b85709549a715cc80135afdec8395458664ffd00d074e6b8c73c013443f17707cbaf8d1f6e7b44234b04ebf663a3186b09c28e7cb3825dfd6b82642c528c2b17c1fd84d04afc875f3f002f53650a13c00ea0b2a51c09c2f2c8e1b3bf1ad086997371e72d2409a354d3b542596de8d7e3b62c51bfe87c28d27c01a10"}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000300)) 12:22:14 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) bind$ax25(r0, &(0x7f0000000000)={{0x3, @null, 0x8}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null]}, 0x48) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x1}}, 0x18) 12:22:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:14 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xcc, 0x400180) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000040)={0x1}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1}}, 0x20) 12:22:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 12:22:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x9, 0x5, 0x3fe, 0x0, @private1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x10, 0x40, 0x2, 0x4}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$SIOCAX25DELFWD(r4, 0x89eb, &(0x7f0000000540)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xfffffffd, @rand_addr=' \x01\x00', 0xfffffc01}, r6}}, 0x30) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', r1, 0x2f, 0x3, 0x8, 0x0, 0x20, @mcast1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x80, 0xfffffff9, 0x7f}}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @private=0xa010102}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c8c0}, 0x4000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 12:22:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0xfffffffd, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:14 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000000)={0x0, "9aa5774eaa1a8c10edba09a0b5bb4ca5220a4d25b698dee9ec3606aa7bb453329ad5768048675a9de59578e18c034e49dc03cf2a179e1b9c70cc2599cedb84df0a132fe8043a4ae37555bfb4d24208092584e081f307529fc45fc7aadf52c6946173157f436f8ea8758f6707395d7279d00753d3b391025de74c021a6a720115"}) r1 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80000) connect$x25(r1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "b399c4d0d8b3bd3e2fa6c566c4dd98f9842df344147d2f1cb67d297d05f589e68dc7a73e24ab42ed33aad2ad30bea6b3234d7e1d912f2cd069f5709ac935d5df55942a57365590ccc334c0467d6f72f82b465f5705941f4ecd8457211610de32e312ee7e215d53456b660a1632a50a2be27f174e407866ab8116faf8e7e9d06ee83a96942eb155002aaf42658b73a32eadb2c698f0fb32925b0efa48e05e2ae95ce5350d5ba3e47bc247ee5077cef64c868acdd383eb3cf32ca3b0a34edb4ef2e68a9e6814b0e6c0abbe054a3cbf612f4cdecd96260e8a61222c5fcdac473062b0ceb1a7ba4d36140d93d0b8d34139307f17aad4e9fb7a7ebc8d15e153d6c403", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) 12:22:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x0, 0x11}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast1, 0xffffffff}, r4}}, 0x30) 12:22:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 12:22:14 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r1, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1f, 0x3, "173bd4c26f0a44b86b5c811e321549501e7d36324c801f81fc7418639f7562bd1b525c5cdd56ca5ce1651252e5dc4d9b5e6025d94f6e71451d9f709243f8b6dc6a34fe998582f6048c83c9424045b7391c69934153911f06485c5fbb0c7f12063c193b59c570c11db94f2323e263910412fb7654898f1868fa4f6bedffae4bbc25bbac2196642202c1ffffff0f2d503fc357ed70eee7541dfd49e374a71e14391d96c4e0a7ca88b0dd6d4c84fb643605764e3c14f12cf7ad2baad3e5d11f95900e2ca583321b06878ee7337b1b923785d9e60f9b551fa9f8e5b343fa9500ad9f397c4b83ccc63c4859a62800", 0x1, 0xff, 0xfd, 0x6, 0x7, 0x3, 0x0, 0x1}}}, 0x128) accept4$x25(r1, 0x0, &(0x7f00000002c0), 0x80000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "b399c4d0d8b3bd3e2fa6c566c4dd98f9842df344147d2f1cb67d297d05f589e68dc7a73e24ab42ed33aad2ad30bea6b3234d7e1d912f2cd069f5709ac935d5df55942a57365590ccc334c0467d6f72f82b465f5705941f4ecd8457211610de32e312ee7e215d53456b660a1632a50a2be27f174e407866ab8116faf8e7e9d06ee83a96942eb155002aaf42658b73a32eadb2c698f0fb32925b0efa48e05e2ae95ce5350d5ba3e47bc247ee5077cef64c868acdd383eb3cf32ca3b0a34edb4ef2e68a9e6814b0e6c0abbe054a3cbf612f4cdecd96260e8a61222c5fcdac473062b0ceb1a7ba4d36140d93d0b8d34139307f17aad4e9fb7a7ebc8d15e153d6c403", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 12:22:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x7fffffff}}, 0x18) 12:22:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100), 0x20080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x2, {0x302, 0x1, "174a032a78d2cc157b06019abfbc308e7dbb8f28233a82e6bd4399e8cfd2fb91d3f104a216d8096ef0e9829ae6ba67ef9ca73abc0d065189c5985345a6657ca5942b129398b2492263392f370c732d146908ca9757e656f662a1d9bade2801d3baac009baa51f8ac60a0a2a0e174daa804aaf570151374dbcbce10a670342ce1c79d247a6e4ca17370ddb8b02452a465d1d5b16a82d7d848e00f51d6f491fdffbc6b1f8b4c1c95a0299f2ab796805ed83540beae00d8a252b3c9d5f34d78d66b5be66c8f74daf95816b0e322ad092b0329fa492ebcfa1de970d16c7374971c01058e1e4df13650632aaf6d581d0352a045187380a7f9abba1e7df7af9345a8f1", 0x9, 0xdb, 0x87, 0xfb, 0x8, 0x7f, 0xb, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f00000001c0)=@rose={'rose', 0x0}, 0x10) 12:22:14 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:14 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) 12:22:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000000)={0x40, 0x7fff, 0x5, 0x7, 0x36b3, 0x81}) getsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x104}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000300)={0x1d, 0x0, 0x0, {0x2, 0x1, 0x4}, 0x2}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0xc5c58ee564c6385d, 0x0, [0x1000, 0xff, 0x4, 0x7, 0x7f, 0x0, 0x8000, 0x200, 0xb0de, 0x4, 0x4, 0xffffffff, 0x1, 0x200000, 0x8, 0x8000]}, {0x33, 0x0, [0x2, 0x5f, 0x6, 0x4, 0xfffffffa, 0xfff, 0x10001, 0x52, 0x8, 0xffff, 0x9, 0xed9, 0x0, 0x1ff, 0x6c, 0x8]}, {0x2, 0x0, [0x5, 0x1, 0x3, 0x3, 0xfffff800, 0x80000001, 0x1f, 0x7, 0xffffff00, 0x80, 0x8d3c, 0x10001, 0x3, 0x3ff, 0x2, 0x2]}, {0x20, 0x0, [0x5, 0x1000, 0x7fff, 0x7, 0x4c4d45b9, 0x5, 0x8, 0x6, 0x400, 0x0, 0x0, 0x3, 0xff, 0x1, 0xfff, 0x3]}], r1, 0x1, 0x1, 0x120}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x2, 0x6}}, 0x20) 12:22:14 executing program 2: setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x14, 0x1, 0x5, 0xb, 0xffff}) 12:22:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:14 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x1f, 0x2, 0x61, @mcast1, @mcast2, 0x1, 0x7800, 0x965e, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x29, 0x7f, 0x9, 0xfffffff7, 0x4c, @mcast1, @ipv4={'\x00', '\xff\xff', @local}, 0x8, 0x10, 0x7f, 0x8ca}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:14 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40840}, 0x4008004) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:14 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x1}}, 0x20) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100), 0x21c040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000180)=[{0x2, 0x0, [0x2, 0xd7, 0x5, 0x8, 0xfff, 0xffffffff, 0x7, 0x3, 0x0, 0x0, 0xf553, 0xcd7c, 0x0, 0xfffff59d, 0x3b, 0xb0]}, {0x1, 0x0, [0x0, 0xffffffb0, 0x8ace, 0x7, 0x0, 0x7, 0x808000, 0x2, 0x225f, 0x2, 0x0, 0x9, 0x1b, 0x7, 0xff, 0x3]}], r2, 0x1, 0x1, 0x90}}, 0x20) 12:22:14 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) 12:22:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x1f, 0x2, 0x61, @mcast1, @mcast2, 0x1, 0x7800, 0x965e, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x29, 0x7f, 0x9, 0xfffffff7, 0x4c, @mcast1, @ipv4={'\x00', '\xff\xff', @local}, 0x8, 0x10, 0x7f, 0x8ca}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:15 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) bind$x25(r1, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) 12:22:15 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "b399c4d0d8b3bd3e2fa6c566c4dd98f9842df344147d2f1cb67d297d05f589e68dc7a73e24ab42ed33aad2ad30bea6b3234d7e1d912f2cd069f5709ac935d5df55942a57365590ccc334c0467d6f72f82b465f5705941f4ecd8457211610de32e312ee7e215d53456b660a1632a50a2be27f174e407866ab8116faf8e7e9d06ee83a96942eb155002aaf42658b73a32eadb2c698f0fb32925b0efa48e05e2ae95ce5350d5ba3e47bc247ee5077cef64c868acdd383eb3cf32ca3b0a34edb4ef2e68a9e6814b0e6c0abbe054a3cbf612f4cdecd96260e8a61222c5fcdac473062b0ceb1a7ba4d36140d93d0b8d34139307f17aad4e9fb7a7ebc8d15e153d6c403", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r3}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) 12:22:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair(0x3, 0xa, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$x25(r2, &(0x7f0000000100)="db453452c2f4bb77f26876335cd07dfb2e583bb7f0c5483dfe16aa17f1c0f46d412cd0a0752064fa8a244b473cc950b2728ae9aa845a82b1e1eceb4567233e32b3b1fc9a49a1113ba3753288eb5be0302f58b786c2f1b7f37a254bd1841c254d78a7fd1a8e906df8cc499000e1cd86af6cc0dcea46ab02c574162864368894d65a7d456ec7b5dcb67f7ea4aeb060854a3c12b0d398459428c8c9", 0x9a, 0x20044860, &(0x7f00000001c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) accept4$x25(r2, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x80000) ioctl$SIOCX25GFACILITIES(r1, 0x40086602, &(0x7f0000000000)) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x8010, 0xffffffffffffffff, 0x1b) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x40, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:15 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:15 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040), 0x8, 0xc0) read$midi(r0, &(0x7f0000000080)=""/53, 0x35) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000000c0)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) 12:22:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x1f, 0x2, 0x61, @mcast1, @mcast2, 0x1, 0x7800, 0x965e, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x29, 0x7f, 0x9, 0xfffffff7, 0x4c, @mcast1, @ipv4={'\x00', '\xff\xff', @local}, 0x8, 0x10, 0x7f, 0x8ca}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x0, 0xa}}, 0x20) clock_gettime(0x2, &(0x7f0000000140)) 12:22:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="300000006a0010002abd7000fbdbdf250a0000000000000008000500", @ANYRES32=0x0, @ANYBLOB="080005002949a8be08aaa3dd0836f907bed2e215d89d1c1b64a685d175ac5952c9be9a55909de4140b32a61733e23ca5976443ea07bbd60c59fe6fc569e7a971782c55015bf462dd68ddea1e6f6c901a04866403874dde639d2f3c0e851fc5c94fcc7493dee9deb5a1dd8154f8622ccaf91c2f751d7fbcef4514fe1e460e2dbe9f8d26a105a4b195343dca664832dc7b67ae97dd", @ANYRES32=0x0, @ANYBLOB="08000a0002000000"], 0x30}, 0x1, 0x0, 0x0, 0x40800}, 0x4080) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7f}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3d}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 12:22:15 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x1f, 0x2, 0x61, @mcast1, @mcast2, 0x1, 0x7800, 0x965e, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x29, 0x7f, 0x9, 0xfffffff7, 0x4c, @mcast1, @ipv4={'\x00', '\xff\xff', @local}, 0x8, 0x10, 0x7f, 0x8ca}}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000140)) 12:22:15 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r6, 0x0, "195ffb", "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"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r7, 0x0, 0x2, 0x4}}, 0x20) 12:22:15 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:15 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/246, 0xf6}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/70, 0x46}], 0x3, &(0x7f0000001280)=""/153, 0x99}, 0x12060) bind$x25(r1, &(0x7f0000001380)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:22:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) clock_gettime(0x2, &(0x7f0000000140)) 12:22:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x1f, 0x2, 0x61, @mcast1, @mcast2, 0x1, 0x7800, 0x965e, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl0\x00', r0, 0x29, 0x7f, 0x9, 0xfffffff7, 0x4c, @mcast1, @ipv4={'\x00', '\xff\xff', @local}, 0x8, 0x10, 0x7f, 0x8ca}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0x10}, 0x18) 12:22:15 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:15 executing program 2: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) clock_gettime(0x2, &(0x7f0000000140)) 12:22:15 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x2, 0x1f, 0x2, 0x61, @mcast1, @mcast2, 0x1, 0x7800, 0x965e, 0x4}}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:15 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:15 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:16 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getpid() clock_gettime(0x2, &(0x7f0000000140)) 12:22:16 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) 12:22:16 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040), 0x8, 0xc0) read$midi(r0, &(0x7f0000000080)=""/53, 0x35) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000000c0)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) 12:22:16 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) clock_gettime(0x2, &(0x7f0000000140)) 12:22:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:16 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 12:22:16 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040), 0x8, 0xc0) read$midi(r0, &(0x7f0000000080)=""/53, 0x35) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000000c0)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) 12:22:16 executing program 3: clock_gettime(0x2, &(0x7f0000000140)) 12:22:16 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 12:22:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:16 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 12:22:16 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040), 0x8, 0xc0) read$midi(r0, &(0x7f0000000080)=""/53, 0x35) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000000c0)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) 12:22:16 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) 12:22:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:16 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x4f}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x68) 12:22:16 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(0xffffffffffffffff, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) 12:22:16 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 12:22:16 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) connect$x25(r0, &(0x7f0000000740), 0x12) bind$ax25(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@bcast, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f0000000080)={0x7a, 0x7, 0x6, 0x6, 0x6, 0x81}) ioctl$SIOCX25GFACILITIES(r3, 0x8912, &(0x7f00000001c0)) 12:22:16 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, 0x0) 12:22:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:16 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x1, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:16 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) 12:22:16 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) 12:22:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:16 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, 0x0) 12:22:16 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x0, 0xa}}, 0x20) clock_gettime(0x2, &(0x7f0000000140)) 12:22:16 executing program 2: getuid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x12, 0x80000) accept4$x25(r1, &(0x7f0000000240), &(0x7f0000000280)=0x12, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000180)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000000)={'veth1_to_team\x00', 0xde4f, 0x9}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 12:22:17 executing program 3: clock_gettime(0x2, 0x0) 12:22:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:17 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, 0x0) 12:22:17 executing program 3: clock_gettime(0x2, 0x0) 12:22:17 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40840}, 0x4008004) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r1, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1f, 0x3, "173bd4c26f0a44b86b5c811e321549501e7d36324c801f81fc7418639f7562bd1b525c5cdd56ca5ce1651252e5dc4d9b5e6025d94f6e71451d9f709243f8b6dc6a34fe998582f6048c83c9424045b7391c69934153911f06485c5fbb0c7f12063c193b59c570c11db94f2323e263910412fb7654898f1868fa4f6bedffae4bbc25bbac2196642202c1ffffff0f2d503fc357ed70eee7541dfd49e374a71e14391d96c4e0a7ca88b0dd6d4c84fb643605764e3c14f12cf7ad2baad3e5d11f95900e2ca583321b06878ee7337b1b923785d9e60f9b551fa9f8e5b343fa9500ad9f397c4b83ccc63c4859a62800", 0x1, 0xff, 0xfd, 0x6, 0x7, 0x3, 0x0, 0x1}}}, 0x128) accept4$x25(r1, 0x0, &(0x7f00000002c0), 0x80000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:17 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x9, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:17 executing program 3: clock_gettime(0x2, 0x0) 12:22:17 executing program 4: getuid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x12, 0x80000) accept4$x25(r1, &(0x7f0000000240), &(0x7f0000000280)=0x12, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000180)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000000)={'veth1_to_team\x00', 0xde4f, 0x9}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) 12:22:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r1, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1f, 0x3, "173bd4c26f0a44b86b5c811e321549501e7d36324c801f81fc7418639f7562bd1b525c5cdd56ca5ce1651252e5dc4d9b5e6025d94f6e71451d9f709243f8b6dc6a34fe998582f6048c83c9424045b7391c69934153911f06485c5fbb0c7f12063c193b59c570c11db94f2323e263910412fb7654898f1868fa4f6bedffae4bbc25bbac2196642202c1ffffff0f2d503fc357ed70eee7541dfd49e374a71e14391d96c4e0a7ca88b0dd6d4c84fb643605764e3c14f12cf7ad2baad3e5d11f95900e2ca583321b06878ee7337b1b923785d9e60f9b551fa9f8e5b343fa9500ad9f397c4b83ccc63c4859a62800", 0x1, 0xff, 0xfd, 0x6, 0x7, 0x3, 0x0, 0x1}}}, 0x128) accept4$x25(r1, 0x0, &(0x7f00000002c0), 0x80000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$vhost_msg(r1, &(0x7f0000000340)={0x1, {&(0x7f0000000200)=""/115, 0x73, &(0x7f0000000280)=""/150, 0x2, 0x4}}, 0x48) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r3, 0xc0245720, &(0x7f0000000180)) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 12:22:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000300)) 12:22:17 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x7536, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x1}}, 0x18) 12:22:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r1, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1f, 0x3, "173bd4c26f0a44b86b5c811e321549501e7d36324c801f81fc7418639f7562bd1b525c5cdd56ca5ce1651252e5dc4d9b5e6025d94f6e71451d9f709243f8b6dc6a34fe998582f6048c83c9424045b7391c69934153911f06485c5fbb0c7f12063c193b59c570c11db94f2323e263910412fb7654898f1868fa4f6bedffae4bbc25bbac2196642202c1ffffff0f2d503fc357ed70eee7541dfd49e374a71e14391d96c4e0a7ca88b0dd6d4c84fb643605764e3c14f12cf7ad2baad3e5d11f95900e2ca583321b06878ee7337b1b923785d9e60f9b551fa9f8e5b343fa9500ad9f397c4b83ccc63c4859a62800", 0x1, 0xff, 0xfd, 0x6, 0x7, 0x3, 0x0, 0x1}}}, 0x128) accept4$x25(r1, 0x0, &(0x7f00000002c0), 0x80000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000300)) 12:22:17 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:17 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$vhost_msg(r1, &(0x7f0000000340)={0x1, {&(0x7f0000000200)=""/115, 0x73, &(0x7f0000000280)=""/150, 0x2, 0x4}}, 0x48) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r3, 0xc0245720, &(0x7f0000000180)) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 12:22:17 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r0, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1f, 0x3, "173bd4c26f0a44b86b5c811e321549501e7d36324c801f81fc7418639f7562bd1b525c5cdd56ca5ce1651252e5dc4d9b5e6025d94f6e71451d9f709243f8b6dc6a34fe998582f6048c83c9424045b7391c69934153911f06485c5fbb0c7f12063c193b59c570c11db94f2323e263910412fb7654898f1868fa4f6bedffae4bbc25bbac2196642202c1ffffff0f2d503fc357ed70eee7541dfd49e374a71e14391d96c4e0a7ca88b0dd6d4c84fb643605764e3c14f12cf7ad2baad3e5d11f95900e2ca583321b06878ee7337b1b923785d9e60f9b551fa9f8e5b343fa9500ad9f397c4b83ccc63c4859a62800", 0x1, 0xff, 0xfd, 0x6, 0x7, 0x3, 0x0, 0x1}}}, 0x128) accept4$x25(r0, 0x0, &(0x7f00000002c0), 0x80000) 12:22:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000300)) 12:22:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:17 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:17 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:17 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:17 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r0, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1f, 0x3, "173bd4c26f0a44b86b5c811e321549501e7d36324c801f81fc7418639f7562bd1b525c5cdd56ca5ce1651252e5dc4d9b5e6025d94f6e71451d9f709243f8b6dc6a34fe998582f6048c83c9424045b7391c69934153911f06485c5fbb0c7f12063c193b59c570c11db94f2323e263910412fb7654898f1868fa4f6bedffae4bbc25bbac2196642202c1ffffff0f2d503fc357ed70eee7541dfd49e374a71e14391d96c4e0a7ca88b0dd6d4c84fb643605764e3c14f12cf7ad2baad3e5d11f95900e2ca583321b06878ee7337b1b923785d9e60f9b551fa9f8e5b343fa9500ad9f397c4b83ccc63c4859a62800", 0x1, 0xff, 0xfd, 0x6, 0x7, 0x3, 0x0, 0x1}}}, 0x128) 12:22:18 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbc, 0x9, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:22:18 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) 12:22:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r0, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000300)={0x4b, 0x20, 0x8, 0xc, 0x7f, 0x81}) 12:22:18 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x80800) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = accept4$x25(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x12, 0x80000) ioctl$SIOCX25GFACILITIES(r2, 0x8912, &(0x7f0000000100)) 12:22:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:22:18 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:18 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x94, r2, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x94}}, 0x4000) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r0, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000240)={0x8, 0x2, 0x1, 0x1, 0x6, 0xb, 0xc, "371ac7f1c7edb372c0faa172424fb2a5e37fb947", "6e2e20569112163d7f9008be3e702606ca07a1b5"}) 12:22:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:18 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) clock_gettime(0x0, &(0x7f00000004c0)) 12:22:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r0, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) 12:22:18 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @empty}}}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000340)=""/169, 0xa9}, {&(0x7f0000000400)=""/28, 0x1c}, {0xffffffffffffffff}, {&(0x7f0000000440)=""/216, 0xd8}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/176, 0xb0}, {&(0x7f0000000700)=""/18, 0x12}, {&(0x7f0000000740)=""/189, 0xbd}, {&(0x7f0000000800)=""/8, 0x8}], 0x9}, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000940)={0x81, 0x9}) 12:22:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r1}}, 0x20) 12:22:18 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) sendto$ax25(r0, &(0x7f0000000440)="7a66a00812050abf066789ac09cfa418a9836e80616138203746777fceb7c7ea0aefcf9eee451c49101a566ced5a710b5d65c1058fb9a2e6513290ffb51eac8896bd9f698e30a90590b266974c447850d42c995a68cb55e3f7943637b5092285712045dd4784970d3de6decbfb817b05ff2d8e0b26ca9ccf21bb2b1df416a82789ad7a1f312dc049bec75d69f1745f985f896574a1f6046dfefa3dcb2d90ee2df50f5431dd2f589c08cf27daca7222b9945cee753bfaf80969420879cb1dd0f1377da450114fa4b4ad7908cd0e219b6212d00a1cf1c186086ccaa5ffa77cf3a6d5445fac69e2b8c8721de1f32804494e9bffaf0d548b", 0xf6, 0x6, 0x0, 0x0) 12:22:18 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000080)) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f00000000c0)={0x1e}) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000000)={0x8, 0x7f}) r4 = socket$inet_udp(0x2, 0x2, 0x0) accept4(r4, 0x0, &(0x7f0000000040), 0x80000) 12:22:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:18 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3682c8425bf80041b5faeab850e352dedad7e1ca", "727fec8ac14f8057115c0b106e1dff15f9de59ae"}) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r4}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x6d, 0x80, 0x7f, 0x7, 0x0, 0x1, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x2}, 0xd6c31, 0x5, 0xf0000000, 0x8, 0x1, 0x8, 0x18a3, 0x0, 0x12, 0x0, 0x4}, r1, 0x10, r2, 0x8) 12:22:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:18 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0xfe, 0x2, 0x7fff, 0x3, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1, 0x80, 0x8, 0x3ff}}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:18 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:18 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) write$sysctl(r1, &(0x7f0000000040)='1\x00', 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7fff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="05000000000000000000000000000000000000000008000000000000"]) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x3, 0x8, "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", 0x5, 0x9, 0x7, 0x1, 0x0, 0x3, 0x8, 0x1}, r3}}, 0x120) clock_gettime(0x2, &(0x7f0000000140)) 12:22:18 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x1800) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000080)) 12:22:19 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:19 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:19 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000140)) socketpair(0x29, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000080)={0x43, "5ccc6b8ca0419502168135dbce991b1e9ffa085adf6426f13f0a4ac6fc1122be95c3bc82fc88f8e22ac1fd2858a812d94672d3ab47117abd8ca9d47b36000f640ad23656bbfe5129f73101011837b5e40a32f3f3f5edddc68b61d3aa08cb14ffeed166c5be353ebb3b91438d9624204e448a55dd32bc9510c3ec1285b1d7b9b4"}) 12:22:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x0, 0xa}}, 0x20) clock_gettime(0x2, &(0x7f0000000140)) 12:22:19 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:19 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:19 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) 12:22:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000140)) 12:22:19 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:19 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) accept4$x25(r0, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x180800) 12:22:19 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x9, 0xff, 0x3f, 0x9, 0x0, 0x1000, 0x48080, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x280, 0x4, 0x8, 0xd06b7b1883dd8398, 0x1, 0x7, 0x2, 0x0, 0x81, 0x0, 0x716c}, 0x0, 0x3, 0xffffffffffffffff, 0x8) clock_gettime(0x2, &(0x7f0000000140)) 12:22:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:19 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) recvmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/36, 0x24}], 0x1, &(0x7f0000000080)=""/148, 0x94}, 0x40010002) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x29, 0x3, 0x40, 0x80, 0x40, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40, 0x20, 0x9, 0xf351}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f00000002c0)={'syztnl2\x00', 0x0, 0x2f, 0x4, 0x3f, 0x0, 0x60, @loopback, @ipv4={'\x00', '\xff\xff', @remote}, 0x40, 0x7800, 0x0, 0xffff57c6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x22000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000380)=ANY=[@ANYBLOB="c8021100", @ANYRES16=0x0, @ANYBLOB="10062abd7000fedbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="8000028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="24a38d01006c625f73746174735f726566726573685f696e74657276616c00000000000000050000000008000400940000003c00010024000100757365725f73006e6b757000000000000000000000000000000000000000000005000300060000000400040008000600000000", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000008008000600", @ANYRES32=0x0, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000005000300050000000900040068617368000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000104000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040002000000"], 0x2c8}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000700)) 12:22:19 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f00000000c0)) clock_gettime(0x2, &(0x7f0000000140)) 12:22:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:19 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:19 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) getpid() clock_gettime(0x2, &(0x7f0000000140)) 12:22:19 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000380)="0ea32cbd6eb61e7663d7e53623c8bd5b82ebc135273484acfa5571bdc3cc9ba25afcba46ead702ac775503306f2aece1415b3528dd467e2721ae1bef4de64bf8c49678f8c548afd815b542515e5151c0f35ba39d6709cf678f16c93bcaf073008587292601e6e59e40189ee7738d9ec6145621ee2b991ae63d8d8fd4300ab7fc70433e971dcdb93ccddee82e0c6249c4af809eb1c43a0c834615efe2cfea000997", 0xa1, 0x1, &(0x7f0000000200)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:19 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0, 0x33fe0}}, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:19 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:20 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) clock_gettime(0x2, &(0x7f0000000140)) 12:22:20 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:20 executing program 2: ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000040), 0x12) connect$x25(r1, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) recvmsg$can_bcm(r1, &(0x7f00000007c0)={&(0x7f00000005c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)=""/7, 0x7}], 0x1, &(0x7f00000006c0)=""/221, 0xdd}, 0x2040) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000800)={0xff, 0x4}) 12:22:20 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 12:22:20 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r0}}, 0x20) 12:22:20 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 12:22:20 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 12:22:20 executing program 3: clock_gettime(0x2, &(0x7f0000000140)) 12:22:20 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:20 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r0}}, 0x20) 12:22:20 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000100)=0x1, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000000)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000040)) 12:22:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:20 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 12:22:20 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:20 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) 12:22:20 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r0}}, 0x20) 12:22:20 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) accept4(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:20 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) 12:22:20 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:20 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = accept4$x25(r0, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x81800) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) bind$x25(r3, &(0x7f0000000100)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) r4 = accept4$x25(r1, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000140)=0x12, 0x800) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'sit0\x00', 0x0, 0x4, 0x3, 0x3, 0xe8e0, 0x1, @initdev={0xfe, 0x88, '\x00', 0xff, 0x0}, @mcast1, 0x80d1, 0x20, 0x1, 0x855}}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000400)={0x1d, r5, 0x2, {0x2, 0xf0, 0x2}, 0xfd}, 0x18) connect$x25(r4, &(0x7f0000000740)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) syz_init_net_socket$ax25(0x3, 0x2, 0xce) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) accept4(r6, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000080)=0x80, 0x0) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) socket$inet_udp(0x2, 0x2, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r8, 0x8912, &(0x7f0000000240)) 12:22:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:20 executing program 3: clock_gettime(0x0, &(0x7f0000000140)) 12:22:20 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:20 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) 12:22:20 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\'\x00') sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4140}, 0x8010) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:20 executing program 3: clock_gettime(0x2, 0x0) 12:22:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) 12:22:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:21 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:21 executing program 3: clock_gettime(0x2, 0x0) 12:22:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x424087, 0x0) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, 0x0, 0x0, {0x2, 0xff, 0x3}, 0x1}, 0x18) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) 12:22:21 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0)=0x50, 0x4) 12:22:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:21 executing program 3: clock_gettime(0x2, 0x0) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 12:22:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042bbd7000fddbdf250400060014001f00fe8000000000000000000000000000bb0c001000060000000000000006001c007f00000005000700030000000500060003001c0008000a0003000000de28f8657dfe2ca2231beb7e42e817d3715dc4c6e0ac5c21282aac295dad86"], 0x54}, 0x1, 0x0, 0x0, 0x4004001}, 0x14890) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfff}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @remote}}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20004000}, 0x1) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:21 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x29, 0x9, 0x81, 0x5, 0x1, @ipv4={'\x00', '\xff\xff', @multicast1}, @private0, 0x8, 0xbea90bba8429b508, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000340)={'ip6tnl0\x00', r0, 0x4, 0x4, 0x52, 0x400, 0x40, @private1={0xfc, 0x1, '\x00', 0x21}, @private2, 0x10, 0x8, 0x4b1e6e2a, 0x8}}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r2, 0x8912, &(0x7f00000001c0)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0xb9, 0x6, 0x2, 0x25, @loopback, @remote, 0x8000, 0x47, 0x2, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl1\x00', r3, 0x29, 0x9, 0x40, 0x3, 0x9, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8, 0x10, 0x5, 0x6}}) 12:22:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 12:22:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:21 executing program 2: ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f00000001c0)) 12:22:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:21 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 12:22:21 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000540)) connect$x25(r0, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x7, @loopback, 0x112}}}, 0x30) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) accept4$x25(r0, &(0x7f0000000580)={0x9, @remote}, &(0x7f00000005c0)=0x12, 0x800) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000640)={0x1, 0x10, 0xfa00, {&(0x7f0000000600), r7}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x80, 0x20, "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", 0x20, 0x5, 0x8, 0x2f, 0x9, 0x7, 0x80, 0x8}, r5}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r8, 0xe0, "aa3a91", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0xfffffffffffffdb7) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:21 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:21 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) socketpair(0x11, 0x80000, 0x1f, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000002c0)={'ipvlan1\x00', 0x0, 0x8}) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f00000003c0)={0x79, "7c82227b41dabb511a69f546ddc1404abe515056f44d83bff4d638d038bd9173e296ec9f751defb081bc94a82c1df4351f8e399e9588d67e8368a0952898ce3b3209d006a5deea31b0213be0463b6753c59b51564545728e8ffaa900e35fbf8b3ed25a067412f9f93eaef16c36bf2456a6036d0ddf7674b8b883e4333994d2d7"}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x400802, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="b80000000f14040026bd7000ffdbdf2508004500737270000800030002000000080045007372700008000100010000000800030002000000986907259690f7d59aaa8949c2d4b3a8a98ead2699b794cfc322a534ce0627b5d9cac5e28c170378cb75f93e05c1b57abcc95a24e3438e3e159ba127e5c6"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f0000000000)={0x3a, "aefa9a628655c5de460dab93196bb219d1d99a1b96f55e209497eb59788661d9b6925357b75b530a6f99f2743641f79314f77af3d535f3d71c4c0311ed6f47d40c2509704763e4abc152f82562d59c3ffbb41709ccae2ba8b7ef678fbfe42febceb29197d3b4772e4acf17c7826315b7d538f8dbe3aba42aa082e5c1c14ceba1"}) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480), 0x400, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000500), r1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x29, 0x6, 0x2, 0x8, 0xf, @mcast2, @remote, 0x40, 0x700, 0x7, 0x3f}}) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r7, &(0x7f0000000740), 0x12) sendmsg$SMC_PNETID_FLUSH(r7, &(0x7f00000010c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001080)={&(0x7f0000001000)={0x58, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_vlan\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x44000}, 0x8004850) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000006c0)={'ip6gre0\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x4, 0x7, 0xfc, 0x8, 0x18, @private0={0xfc, 0x0, '\x00', 0x1}, @private2, 0x700, 0x8000, 0x2, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x4, 0x3, 0x7f, @local, @remote, 0x7, 0x8, 0x4302b32b, 0x200}}) sendmsg$FOU_CMD_GET(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x44, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_IFINDEX={0x8, 0xb, r9}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000002}, 0x24048005) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f0000000880)={'ip6gre0\x00', &(0x7f0000000800)={'syztnl0\x00', 0x0, 0x4, 0xf7, 0x5, 0x2, 0x7, @loopback, @ipv4={'\x00', '\xff\xff', @loopback}, 0x10, 0x8, 0x1, 0xc00}}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000fc0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000f80)={&(0x7f00000008c0)={0x6ac, r5, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8}, {0x1bc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x66}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe05}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x1a0, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3c18}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x39c}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xa8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xa5cc}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x6, 0x0, 0xb4, 0x3}, {0x5, 0xa6, 0x81, 0x8da}, {0x9, 0x1, 0xfd, 0x4}, {0x1, 0x1f, 0x1, 0x4}, {0x5d, 0x96, 0x40, 0x9}, {0x6, 0x8, 0x5, 0x20}, {0x2, 0x3f, 0x2, 0x4}, {0xefbb, 0x7, 0x4, 0x4555}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x6ac}, 0x1, 0x0, 0x0, 0x20000090}, 0x4) 12:22:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) accept4$x25(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x80000) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) 12:22:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:22 executing program 3: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) 12:22:22 executing program 2: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000), 0x2) syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x603c02, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000080)) 12:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:22 executing program 3: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) 12:22:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept$netrom(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 3: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) 12:22:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:22 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x29, 0xc0, 0x1, 0x1, 0x14, @private1, @empty, 0x40, 0x20, 0x290c, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x7, 0xffffffff, 0x0, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7820, 0x700, 0x30e, 0x140}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x4, 0x8, 0x0, @private0, @loopback, 0x700, 0x700, 0x8000}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0xff, 0x0, 0x7, 0x60, @loopback, @private0, 0x20, 0x700, 0x6d, 0x80000001}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'ip6tnl0\x00', 0x0, 0x4, 0x1f, 0x4, 0x6, 0x50, @ipv4={'\x00', '\xff\xff', @multicast1}, @local, 0x8, 0x7800, 0x1, 0x157b}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl0\x00', 0x0, 0x29, 0x46, 0xf9, 0xad17, 0x31, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x80, 0x20, 0x6, 0xfffffffc}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl0\x00', 0x0, 0x29, 0x20, 0xff, 0x5d, 0x61, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x10, 0x8000, 0x2e}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001200)={&(0x7f0000000680)={0xb50, r1, 0x300, 0x70bd27, 0x25dfdbfe, {}, [{{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2d3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}]}}, {{0x8}, {0x25c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x13}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc0}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x62fd9be0}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x77}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}]}}, {{0x8, 0x1, r6}, {0x1ec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x6, 0x7, 0x6, 0x3}, {0x0, 0x4, 0x0, 0x80}, {0x1, 0x6, 0x0, 0x800}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd47b}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x11c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd4bc}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0xb50}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 12:22:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:22 executing program 4: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept$netrom(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:22 executing program 4: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept$netrom(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:22 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x28080, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580), 0x20200, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f00000005c0)={0x14, 0x5e98db71, 0x6, 0x9, 0x9, 0x81}) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) 12:22:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:23 executing program 4: setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:23 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept$netrom(r0, 0x0, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:23 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x41}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x9, 'veth1_virt_wifi\x00'}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000040)={0x9, 0x5, 0x4, 0x7, 0x1, 0x27, 0x21, "08df05222ec77b85fe393895abe87e754931c2e8", "0a6fe7088e030c8ffb77ab2d926dafac652b1de1"}) 12:22:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:23 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) 12:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:23 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:23 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x70bd2c, 0x2, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x2000020) 12:22:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:23 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) 12:22:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:23 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:23 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:22:23 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) 12:22:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:23 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x29, 0xc0, 0x1, 0x1, 0x14, @private1, @empty, 0x40, 0x20, 0x290c, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x7, 0xffffffff, 0x0, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7820, 0x700, 0x30e, 0x140}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x4, 0x8, 0x0, @private0, @loopback, 0x700, 0x700, 0x8000}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0xff, 0x0, 0x7, 0x60, @loopback, @private0, 0x20, 0x700, 0x6d, 0x80000001}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000440)={'ip6tnl0\x00', 0x0, 0x4, 0x1f, 0x4, 0x6, 0x50, @ipv4={'\x00', '\xff\xff', @multicast1}, @local, 0x8, 0x7800, 0x1, 0x157b}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000500)={'syztnl0\x00', 0x0, 0x29, 0x46, 0xf9, 0xad17, 0x31, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x80, 0x20, 0x6, 0xfffffffc}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'syztnl0\x00', 0x0, 0x29, 0x20, 0xff, 0x5d, 0x61, @ipv4={'\x00', '\xff\xff', @local}, @mcast1, 0x10, 0x8000, 0x2e}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001200)={&(0x7f0000000680)={0xb50, r1, 0x300, 0x70bd27, 0x25dfdbfe, {}, [{{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2d3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x22}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}]}}, {{0x8}, {0x25c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x13}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc0}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x62fd9be0}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x77}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}]}}, {{0x8, 0x1, r6}, {0x1ec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x6, 0x7, 0x6, 0x3}, {0x0, 0x4, 0x0, 0x80}, {0x1, 0x6, 0x0, 0x800}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd47b}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x11c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xd4bc}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0xb50}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 12:22:23 executing program 1: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:23 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000004c0)=0x80, 0x800) sendmsg$802154_dgram(r1, &(0x7f0000000680)={&(0x7f0000000500)={0x24, @none={0x0, 0xffff}}, 0x14, &(0x7f0000000640)={&(0x7f0000000540)="80be222d0bf2eeaca30c102a6a0bbf126401b6ccd060f69d5f603bf4217f8fccb60a63d5b4430ba30acc28297843cf999b92093aaac81c5076056e55da6d664aef8bb40d2669f58394d82232aa96c21b4a3938b406512434d931c262d2176597c83d26c154aa7aff5789d74c58c672bebc0be719cbbc042664ce7973f73443e634755e5ac56666d33f7ef160abf9e89f48180c40e1096be837a0d6f1cb87a5f5a05b20847a2ae3c99c5e9049080d61fa666ce73a76179218e72801e1aae7007cb9f3e7f4951ef93dfa1fc357268f113f3feb7e497c71f5337d678490f8aa9455017589eb1ac317aba07e99d34d2870e59901", 0xf2}, 0x1, 0x0, 0x0, 0xc801}, 0x8010) socketpair(0x2b, 0x800, 0x4, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r1, &(0x7f00000006c0)=@nl, &(0x7f0000000400)=0x80, 0x800) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x29, 0x73, 0x6, 0xfffffff9, 0x5, @remote, @ipv4={'\x00', '\xff\xff', @local}, 0x8000, 0x700, 0x38, 0x3}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="f4020000", @ANYRES16=0x0, @ANYBLOB="00042cbd7000ffdbdf250300000008000100", @ANYRES32=r5, @ANYBLOB="dc0102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004008000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004005d06000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000500000008000600", @ANYRES64=r2, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000500000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB='\b\x00>}', @ANYRES32=0x0, @ANYBLOB="f400028044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746900006261636b757000000000fdff0100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000005000300030700000000000000000000380001002400016966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400ff0300003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b1e8e58956941f5beac6d4ad499fb00"], 0x2f4}, 0x1, 0x0, 0x0, 0x40004}, 0x2693f1425f01080c) r7 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) connect$x25(0xffffffffffffffff, &(0x7f0000000740), 0x12) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000ac0), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x2c, r9, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x23}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4) sendto$x25(r0, &(0x7f0000000040)="2a8ee79d26c59b266b66bcb7314de5869aaf3b721c52739596caa3d8fd8877329c13067892d3735409e1be96513c21edea0025ca367850a2082c2033f1dd54225fe4034191aeec86ccf3afd96959e5f6a888b67bb75d96f949230c3e9633598cae8eb5e2ce76e2cb99a28195cdcd3ae345e12bbc48ca6acc0de84ceab1dcfe5e80f63b90552c13c25fbe629c8f9144b96d4ca330e78da26d52645e4862fb571d2c", 0xa1, 0x8804, 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r8, 0x89e9) ioctl$SIOCX25GFACILITIES(r7, 0x8912, &(0x7f00000001c0)) r10 = accept4$x25(r3, &(0x7f0000000180)={0x9, @remote}, &(0x7f0000000380)=0x12, 0x0) bind$x25(r10, &(0x7f00000003c0), 0x12) 12:22:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:23 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:23 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:23 executing program 1: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x4100, 0x0) 12:22:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:23 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 12:22:23 executing program 2: accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@null, @bcast, @bcast, @null, @bcast, @null, @default, @rose]}, &(0x7f0000000080)=0x48, 0x800) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:24 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000004c0)=0x80, 0x800) sendmsg$802154_dgram(r1, &(0x7f0000000680)={&(0x7f0000000500)={0x24, @none={0x0, 0xffff}}, 0x14, &(0x7f0000000640)={&(0x7f0000000540)="80be222d0bf2eeaca30c102a6a0bbf126401b6ccd060f69d5f603bf4217f8fccb60a63d5b4430ba30acc28297843cf999b92093aaac81c5076056e55da6d664aef8bb40d2669f58394d82232aa96c21b4a3938b406512434d931c262d2176597c83d26c154aa7aff5789d74c58c672bebc0be719cbbc042664ce7973f73443e634755e5ac56666d33f7ef160abf9e89f48180c40e1096be837a0d6f1cb87a5f5a05b20847a2ae3c99c5e9049080d61fa666ce73a76179218e72801e1aae7007cb9f3e7f4951ef93dfa1fc357268f113f3feb7e497c71f5337d678490f8aa9455017589eb1ac317aba07e99d34d2870e59901", 0xf2}, 0x1, 0x0, 0x0, 0xc801}, 0x8010) socketpair(0x2b, 0x800, 0x4, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r1, &(0x7f00000006c0)=@nl, &(0x7f0000000400)=0x80, 0x800) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x29, 0x73, 0x6, 0xfffffff9, 0x5, @remote, @ipv4={'\x00', '\xff\xff', @local}, 0x8000, 0x700, 0x38, 0x3}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="f4020000", @ANYRES16=0x0, @ANYBLOB="00042cbd7000ffdbdf250300000008000100", @ANYRES32=r5, @ANYBLOB="dc0102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004008000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004005d06000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000500000008000600", @ANYRES64=r2, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000500000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB='\b\x00>}', @ANYRES32=0x0, @ANYBLOB="f400028044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746900006261636b757000000000fdff0100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000005000300030700000000000000000000380001002400016966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400ff0300003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b1e8e58956941f5beac6d4ad499fb00"], 0x2f4}, 0x1, 0x0, 0x0, 0x40004}, 0x2693f1425f01080c) r7 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) connect$x25(0xffffffffffffffff, &(0x7f0000000740), 0x12) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000ac0), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x2c, r9, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x23}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4) sendto$x25(r0, &(0x7f0000000040)="2a8ee79d26c59b266b66bcb7314de5869aaf3b721c52739596caa3d8fd8877329c13067892d3735409e1be96513c21edea0025ca367850a2082c2033f1dd54225fe4034191aeec86ccf3afd96959e5f6a888b67bb75d96f949230c3e9633598cae8eb5e2ce76e2cb99a28195cdcd3ae345e12bbc48ca6acc0de84ceab1dcfe5e80f63b90552c13c25fbe629c8f9144b96d4ca330e78da26d52645e4862fb571d2c", 0xa1, 0x8804, 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r8, 0x89e9) ioctl$SIOCX25GFACILITIES(r7, 0x8912, &(0x7f00000001c0)) r10 = accept4$x25(r3, &(0x7f0000000180)={0x9, @remote}, &(0x7f0000000380)=0x12, 0x0) bind$x25(r10, &(0x7f00000003c0), 0x12) 12:22:24 executing program 1: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x4100, 0x0) 12:22:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:24 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000bc0), 0x4) 12:22:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:24 executing program 3: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x4100, 0x0) 12:22:24 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) socket$can_bcm(0x1d, 0x2, 0x2) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f0000000040), 0x12) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x90401, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x1, 0x80, 0x0, 0x81, 0x7, 0x4, 0x0, 0x9, 0x20404, 0x7, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x800, 0x0, @perf_bp={&(0x7f00000000c0), 0xf}, 0x1005, 0x73c, 0xbf, 0x4, 0x2, 0x813, 0x81, 0x0, 0x7, 0x0, 0x8}) 12:22:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:24 executing program 1: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x4100, 0x0) 12:22:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:24 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x1, {0x0, 0x0, 0x4}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f0000000080)="446224d8c75556d040d5fda3dc6e6288bba538a84c82c2a218a528044384d9ad5ea1c3e32033d24f43ea89f326840be4d2e324cade1f3067eb8c25ef94b04ade4a29e502f265a6ead86e0ab50008020fb2f94c5b0360d99ad7a13d72e36e412626d91f72f74b74df19290463284b6d002dc44c94c6df49d472df13726b10f2df9d9504904b86191950b41d2e769cea1e5d8f2812789450c1cd9e7082c05baba9dc62d027d4fd88e2711c9fbd4f977b423c268bbe864c7f917ab29d2dc8c7a6aa5a1b8bbd863f3aa3ce05a0912ce8562dc5d420d6b434949c5727232a6cb97f64eaa748d7cbc38010c91312b8816f5b11b640ef5ccaaa", 0xf6}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) accept$netrom(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x4100, 0x0) 12:22:24 executing program 1: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) 12:22:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:24 executing program 2: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x3, 0x2, 0x5, 0x22, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, 0x40, 0x40, 0x2, 0x8}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x3, 0x6, 0x3, 0x9, 0xc00, 0x1, 0x7ff, '\x00', r0, r1, 0x3, 0x1, 0x1}, 0x40) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000100)={0x5, 0x7f}) ioctl$SIOCX25GFACILITIES(r2, 0x8912, &(0x7f00000001c0)) 12:22:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 12:22:24 executing program 1: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) 12:22:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 12:22:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:22:24 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000080)) socketpair(0x23, 0x1, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x12}}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) accept4$x25(r0, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x80000) 12:22:24 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) 12:22:24 executing program 1: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) 12:22:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:24 executing program 4: accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) write$midi(0xffffffffffffffff, &(0x7f0000000200)="1527f31100d4dbe08ea218faac3b497019b27f2a00962c59ec20f73d3834bc6d7e9a8dd2639ce2886d1e809923a48d04875947233b26d332660596638d8987d06aeea09a649ca4ab5a9887113f174e6d4e402c493155e7dc46032ce8e8920f02babda4a837d10aa70e71e714e69821a460ae6dae22625dbad42636a0d4fe6fcd5b4098b4123f8f914150857e7a4c861e9fc8861500000000", 0x98) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x171100, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0xa8e00, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x1) connect$x25(r1, &(0x7f0000000740), 0x12) bind$ax25(r1, &(0x7f0000000000)={{0x3, @null, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 12:22:24 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x1262, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000040)={0x12, "7ff81ba1baab75a25d34077fccaf3c5d16593244ddeb5d53a0f09f27dc5df1c6b727f57d0e3280220d7ae7f35a9735d646a495d6d6bb814d9ae89e0b03d4b1d9d5e16c53e00245c650e9a147f19a4c6fc67f70fae2191b380dbca3e40975048a2b8c7c5d9a4b2c9204154bd3c5d584274d8789200c46bc7bcc3c1eb84fb4f666"}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000180)={0x1b}) socketpair(0xb, 0xa, 0xffffffff, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x7ff, 0x10001, 0xffffffe0, 0x6, r3, 0xc6b, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x40) connect$x25(r2, &(0x7f0000000740), 0x12) getsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0x4) 12:22:24 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r2, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0xb, 'batadv0\x00'}) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) 12:22:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:22:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:24 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25GFACILITIES(r2, 0x8912, &(0x7f00000001c0)) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={@null, 0x8, 'ip6gre0\x00'}) 12:22:24 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000040), 0x12) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x4b6883, 0x0) write$vga_arbiter(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/292], 0xd) 12:22:24 executing program 4: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x7ff}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x11) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'macsec0\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x20}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x50}, 0x1, 0x0, 0x0, 0x2400c004}, 0x20000000) socket$l2tp6(0xa, 0x2, 0x73) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:24 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r2, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0xb, 'batadv0\x00'}) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) 12:22:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 12:22:25 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0xff, 0x9b}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:25 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xa933) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) r3 = accept4$bt_l2cap(r1, &(0x7f0000000200), &(0x7f0000000240)=0xe, 0x80800) accept4$bt_l2cap(r3, 0x0, &(0x7f00000002c0), 0x800) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000100), r2, 0x0, 0x1, 0x4}}, 0x20) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@null, 0x5, 'gre0\x00'}) 12:22:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, 0x7fffffff}}, 0x18) accept$netrom(r0, 0x0, 0x0) 12:22:25 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0xc0045878, &(0x7f00000001c0)) 12:22:25 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r2, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0xb, 'batadv0\x00'}) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) 12:22:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r11}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r10, 0x1}}, 0x18) 12:22:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="64000000070000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x400, 0xb4, &(0x7f00000000c0)=""/180, 0x41000, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x1, 0xed7f, 0x1000}, 0x10}, 0x78) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000280)=0x4, 0x4) accept$netrom(r1, 0x0, 0x0) 12:22:25 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r2, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0xb, 'batadv0\x00'}) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:25 executing program 0: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:25 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @rose}, [@default, @remote, @default, @rose, @rose, @remote, @netrom, @bcast]}, &(0x7f0000000080)=0x48) socketpair(0x10, 0x800, 0xdbf9, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f00000003c0), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'ip6gre0\x00', 0x0, 0x4, 0x7, 0x3c, 0x3, 0x20, @mcast2, @rand_addr=' \x01\x00', 0x20, 0x8, 0x1, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r3, 0x89f6, &(0x7f0000000600)={'ip6gre0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x29, 0xf1, 0xf1, 0x10001, 0x48, @loopback, @rand_addr=' \x01\x00', 0x7, 0x80, 0x7, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, &(0x7f00000006c0)={'syztnl2\x00', &(0x7f0000000640)={'sit0\x00', 0x0, 0x2f, 0x80, 0x14, 0x800, 0x10, @dev={0xfe, 0x80, '\x00', 0x41}, @private2={0xfc, 0x2, '\x00', 0x9}, 0x7800, 0x700, 0x0, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000780)={'syztnl1\x00', &(0x7f0000000700)={'sit0\x00', 0x0, 0x4, 0xc6, 0x7, 0x6, 0x49, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x1, 0x10000, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r3, 0x89f9, &(0x7f0000000840)={'ip6gre0\x00', &(0x7f00000007c0)={'syztnl0\x00', 0x0, 0x4, 0x1, 0x6, 0xffffffff, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, 0x10, 0x10}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f00000009c0)={'ip6_vti0\x00', &(0x7f0000000940)={'syztnl1\x00', 0x0, 0x2f, 0x80, 0xff, 0x900, 0x61, @loopback, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x1, 0x20, 0x5, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, &(0x7f0000000a80)={'syztnl2\x00', &(0x7f0000000a00)={'sit0\x00', 0x0, 0x2f, 0x7, 0xff, 0x10001, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}, @empty, 0x10, 0x10, 0xfffffc00, 0xf73b}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="e0030000", @ANYRES16=r5, @ANYBLOB="010026bd7000ffdbdf250200000008000100", @ANYRES32=r6, @ANYBLOB="b80002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="300102803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000200000008000700000000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r9, @ANYBLOB="3c00015f6c696e6b75705f656e61626cd3f20000000000000000000000000005000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="ec0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400d555ffff38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000900000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040000000000080007000000000008000100", @ANYRES32=r11, @ANYBLOB="d800028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000104000008000600", @ANYRES32=r12, @ANYBLOB="5c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002c0004003900c002050000000200010002000000400005007ec3882207003f06b38f000020007f030002000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040004000000"], 0x3e0}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r13 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x50102, 0x0) sendto$x25(r13, &(0x7f0000000200)="e346e20fd3f0862a8973f711a815ddaeca790ccfd3de85e0df418ed737558ae0be97624ac2c9a60273270f596522fa2fe7d377f5d8b0c831d3a2e749695763711d546e0dc5fa3af171bb7b4fc3d6522a1900a4032a7590c1a9db6a915b149cba96fa8b8a6ce310a5a5179ad69800e6b2260eacdd52a7a71450409eb1f7df484bc44d0d78a14aec5f83845d40a79841db296d306927731cff3fc50b753e29a9ab8b1990c44d1e46341e64583579b44ab56547f08ecd07df7a5f3e7a51d4162a67cf", 0xc1, 0x4, &(0x7f0000000300), 0x12) accept$netrom(r1, &(0x7f00000000c0)={{0x3, @bcast}, [@null, @remote, @default, @default, @null, @bcast, @netrom, @null]}, &(0x7f0000000140)=0x48) getsockopt$WPAN_WANTACK(r13, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) 12:22:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) accept$netrom(r0, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000000c0)=0x32, 0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) fcntl$getown(r2, 0x9) connect$x25(r1, &(0x7f0000000740), 0x12) 12:22:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r11}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r10, 0x1}}, 0x18) 12:22:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10}, 0x18) 12:22:25 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000100)) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$l2tp6(0xa, 0x2, 0x73) 12:22:25 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) accept$netrom(r1, 0x0, 0x0) accept$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @rose}, [@netrom, @default, @default, @remote, @default, @netrom, @remote, @bcast]}, &(0x7f0000000100)=0x48) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x2, 0xff, 0x81, 0x0, 0x8000, 0x2044, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, @perf_config_ext={0x5, 0x40}, 0x24b4, 0x4, 0x53e, 0x4, 0x1f, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) 12:22:25 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}, 0xb, 'batadv0\x00'}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2dc, @private1, 0x705bd2aa}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r1, 0x1f, "f8c200", "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"}}, 0x110) 12:22:25 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) connect$x25(r1, &(0x7f0000000140)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x52) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:25 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000080)={0x14}) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), 0x4) 12:22:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r11}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r10, 0x1}}, 0x18) 12:22:25 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000580), 0x86081, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0xa8, 0xd3, 0x6, 0x0, 0xff, 0x38, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0xea4, 0xaf}, 0x0, 0x1ff, 0x20, 0x8, 0x100000001, 0x4, 0x9, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) 12:22:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "3c31409554705a3fc98dbe85fd7644cfc67e724342f0558a7cedad08ff06abcd0cfe66b05d4ca1026f6fc22dd62d20cb88552d36ce67a7c167d0af61a62f2ad0ca99c854517cf81fff207a778aaf88ad7988a227bf21c59f200f2db1fba95d23504f5e38d3a665c818314fc9240b3369b59e64bc4fd971c37534170c279f01188af1868fe43354c7580bc892f269084f49c16725e72d33bb9ca3ae2afc8f94a7e1a6f60d6e74fb74cd6f22d9b9443c631a74ee684354784575af925f8271bb0c9fb5f3071d5bcdbc05aea02299737d36c690b149fd9f35e14b29002f6a1521c249664878c71d51566a9b559ee2099b929f6def8cb75e3055551d51430cbc3148"}}, 0x110) 12:22:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2dc, @private1, 0x705bd2aa}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r1, 0x1f, "f8c200", "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"}}, 0x110) 12:22:25 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f0000000040)) 12:22:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x4, {0x6, 0x7ff, "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", 0x4, 0x8, 0x0, 0x64, 0x0, 0x6, 0x80, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x1f, r3, 0x0, 0x0, 0x1}}, 0x20) 12:22:25 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) accept4$x25(r0, &(0x7f00000000c0)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x80400) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r11}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x120) 12:22:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "3c31409554705a3fc98dbe85fd7644cfc67e724342f0558a7cedad08ff06abcd0cfe66b05d4ca1026f6fc22dd62d20cb88552d36ce67a7c167d0af61a62f2ad0ca99c854517cf81fff207a778aaf88ad7988a227bf21c59f200f2db1fba95d23504f5e38d3a665c818314fc9240b3369b59e64bc4fd971c37534170c279f01188af1868fe43354c7580bc892f269084f49c16725e72d33bb9ca3ae2afc8f94a7e1a6f60d6e74fb74cd6f22d9b9443c631a74ee684354784575af925f8271bb0c9fb5f3071d5bcdbc05aea02299737d36c690b149fd9f35e14b29002f6a1521c249664878c71d51566a9b559ee2099b929f6def8cb75e3055551d51430cbc3148"}}, 0x110) 12:22:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2dc, @private1, 0x705bd2aa}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r1, 0x1f, "f8c200", "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"}}, 0x110) 12:22:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x4, {0x6, 0x7ff, "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", 0x4, 0x8, 0x0, 0x64, 0x0, 0x6, 0x80, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x1f, r3, 0x0, 0x0, 0x1}}, 0x20) 12:22:26 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@null, 0x3, 'team0\x00'}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4a004}, 0x20040000) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:26 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r9}}, 0x120) 12:22:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2dc, @private1, 0x705bd2aa}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:26 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) fcntl$getown(r0, 0x9) syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x22902, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) r2 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x20, 0xc6, 0x3, 0xff, 0x0, 0xfffffffffffffffe, 0x10, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3dc00, 0x2}, 0x2000, 0x4, 0xbfc8, 0x8, 0x9, 0xfffffffe, 0xa9e, 0x0, 0x5, 0x0, 0x40}, 0x0, 0xd, r1, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xc, 0x30, r2, 0xfffffffffffffffb) 12:22:26 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) 12:22:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:26 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "3c31409554705a3fc98dbe85fd7644cfc67e724342f0558a7cedad08ff06abcd0cfe66b05d4ca1026f6fc22dd62d20cb88552d36ce67a7c167d0af61a62f2ad0ca99c854517cf81fff207a778aaf88ad7988a227bf21c59f200f2db1fba95d23504f5e38d3a665c818314fc9240b3369b59e64bc4fd971c37534170c279f01188af1868fe43354c7580bc892f269084f49c16725e72d33bb9ca3ae2afc8f94a7e1a6f60d6e74fb74cd6f22d9b9443c631a74ee684354784575af925f8271bb0c9fb5f3071d5bcdbc05aea02299737d36c690b149fd9f35e14b29002f6a1521c249664878c71d51566a9b559ee2099b929f6def8cb75e3055551d51430cbc3148"}}, 0x110) 12:22:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2dc, @private1, 0x705bd2aa}, r4}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:26 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000040), 0x12) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000080)={0x48, 0x80000000, 0x4, 0x4, 0x6, 0x81}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 12:22:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r9}}, 0x120) [ 2159.531701][ T3230] ieee802154 phy0 wpan0: encryption failed: -22 [ 2159.538366][ T3230] ieee802154 phy1 wpan1: encryption failed: -22 12:22:26 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:26 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 0: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x8912, &(0x7f00000001c0)) 12:22:26 executing program 4: write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:26 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) 12:22:26 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect$x25(r0, &(0x7f0000000040), 0x12) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f0000000080)={0x48, 0x80000000, 0x4, 0x4, 0x6, 0x81}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 12:22:26 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) sendto$x25(r0, &(0x7f0000000100)="60096ce3e7f0b9cbf7152c4c14413531d23aaff50992598a33623401fcf22b4dca3d2494ce22eb2b550f0345f7e98ef3a7c58cc8835d4611e5c608e6fd809c9381c0c666aff0650e03a382afd67bb9f3c239aa651466c7917dbe335d096bb79b1d9779acb2ea28", 0x67, 0x0, &(0x7f0000000180)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x12) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000040)={0x3, 0x30, 0x5, 0x0, 0xff, 0x1d, 0x13, "44ceb6bce9661cee2522dfc9e4ce288a5a103fe7", "f25aad322a66c906525672da51efbfa96ad699cd"}) 12:22:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r9}}, 0x120) 12:22:27 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:27 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "3c31409554705a3fc98dbe85fd7644cfc67e724342f0558a7cedad08ff06abcd0cfe66b05d4ca1026f6fc22dd62d20cb88552d36ce67a7c167d0af61a62f2ad0ca99c854517cf81fff207a778aaf88ad7988a227bf21c59f200f2db1fba95d23504f5e38d3a665c818314fc9240b3369b59e64bc4fd971c37534170c279f01188af1868fe43354c7580bc892f269084f49c16725e72d33bb9ca3ae2afc8f94a7e1a6f60d6e74fb74cd6f22d9b9443c631a74ee684354784575af925f8271bb0c9fb5f3071d5bcdbc05aea02299737d36c690b149fd9f35e14b29002f6a1521c249664878c71d51566a9b559ee2099b929f6def8cb75e3055551d51430cbc3148"}}, 0x110) 12:22:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:27 executing program 1: setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000180)=@netrom={'nr', 0x0}, 0x10) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r5, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000000f80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000900)={0x5ac, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x71}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x4}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x8}, {0x3, 0x9, 0x7b}, {0x81, 0x80, 0x6, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xc09}}, {0x8}}}]}}, {{0x8}, {0xe4, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x5, 0x1e, 0x0, 0x2}, {0x3, 0x0, 0x0, 0x9}, {0x1, 0x2, 0x1, 0xdbdf}, {0x3ff, 0x2, 0xfc, 0x4}, {0x7, 0x20, 0x0, 0xc1da}, {0x9, 0x7, 0x7, 0xde3}, {0xae8, 0x1, 0x38, 0x7}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xe39e}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x5ac}, 0x1, 0x0, 0x0, 0x8000}, 0x8020) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r9}}, 0x120) 12:22:27 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x992) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f00000001c0)) 12:22:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:27 executing program 0: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:27 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r4, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'ip6gre0\x00', 0x0, 0x2f, 0x40, 0x0, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x8, 0xbcc, 0x5688}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r5}}, 0x120) 12:22:27 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "3c31409554705a3fc98dbe85fd7644cfc67e724342f0558a7cedad08ff06abcd0cfe66b05d4ca1026f6fc22dd62d20cb88552d36ce67a7c167d0af61a62f2ad0ca99c854517cf81fff207a778aaf88ad7988a227bf21c59f200f2db1fba95d23504f5e38d3a665c818314fc9240b3369b59e64bc4fd971c37534170c279f01188af1868fe43354c7580bc892f269084f49c16725e72d33bb9ca3ae2afc8f94a7e1a6f60d6e74fb74cd6f22d9b9443c631a74ee684354784575af925f8271bb0c9fb5f3071d5bcdbc05aea02299737d36c690b149fd9f35e14b29002f6a1521c249664878c71d51566a9b559ee2099b929f6def8cb75e3055551d51430cbc3148"}}, 0x110) 12:22:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) 12:22:27 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r4, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000800)={'sit0\x00', &(0x7f0000000780)={'sit0\x00', 0x0, 0x29, 0x7, 0x1, 0x7fff, 0x4, @private1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x7800, 0xfff, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r5}}, 0x120) 12:22:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "3c31409554705a3fc98dbe85fd7644cfc67e724342f0558a7cedad08ff06abcd0cfe66b05d4ca1026f6fc22dd62d20cb88552d36ce67a7c167d0af61a62f2ad0ca99c854517cf81fff207a778aaf88ad7988a227bf21c59f200f2db1fba95d23504f5e38d3a665c818314fc9240b3369b59e64bc4fd971c37534170c279f01188af1868fe43354c7580bc892f269084f49c16725e72d33bb9ca3ae2afc8f94a7e1a6f60d6e74fb74cd6f22d9b9443c631a74ee684354784575af925f8271bb0c9fb5f3071d5bcdbc05aea02299737d36c690b149fd9f35e14b29002f6a1521c249664878c71d51566a9b559ee2099b929f6def8cb75e3055551d51430cbc3148"}}, 0x110) 12:22:27 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000240)=0xffffffff, 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x4, 0x40, 0x40, 0x6, 0x0, @remote, @loopback, 0x700, 0x700, 0x1, 0x54}}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@bridge_getvlan={0x30, 0x72, 0x4, 0x70bd28, 0x25dfdbfb, {0x7, 0x0, 0x0, r1}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x200448c0}, 0x40080) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r2, 0x8912, &(0x7f00000001c0)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) accept4(r3, 0x0, &(0x7f0000000000), 0x0) 12:22:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) 12:22:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xff, '\x00', "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"}}, 0x110) 12:22:27 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r4, 0x311}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000700)={'syztnl1\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0x2, 0x3, 0x1, @private2, @loopback, 0x7, 0x10, 0x0, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r5}}, 0x120) 12:22:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) 12:22:27 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair(0x27, 0x80000, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) socketpair(0x5, 0x80000, 0x80000002, &(0x7f0000000080)) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}, 0x9, 'sit0\x00'}) 12:22:27 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, &(0x7f0000000000)) 12:22:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 12:22:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x14, r4, 0x311}, 0x14}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r5}}, 0x120) 12:22:28 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) 12:22:28 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) 12:22:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 12:22:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000f40)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, 0x40}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r3}}, 0x120) 12:22:28 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) 12:22:28 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) 12:22:28 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) 12:22:28 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r0}}, 0x5d) 12:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 12:22:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r3}}, 0x120) 12:22:28 executing program 0: socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) 12:22:28 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) 12:22:28 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) 12:22:28 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r0}}, 0x5d) 12:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) 12:22:28 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, 0x0) 12:22:28 executing program 0: socketpair(0x0, 0x3, 0x6, &(0x7f0000000000)) 12:22:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r3}}, 0x120) 12:22:28 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r0}}, 0x5d) 12:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:28 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, 0x0) 12:22:28 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) 12:22:28 executing program 0: socketpair(0x0, 0x3, 0x6, &(0x7f0000000000)) 12:22:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r3}}, 0x120) 12:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:28 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8912, 0x0) 12:22:28 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r3}}, 0x120) 12:22:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:28 executing program 0: socketpair(0x0, 0x3, 0x6, &(0x7f0000000000)) 12:22:29 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r2}}, 0x120) 12:22:29 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) accept$netrom(r1, 0x0, 0x0) 12:22:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:29 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:29 executing program 0: socketpair(0x2c, 0x0, 0x6, &(0x7f0000000000)) 12:22:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r2}}, 0x120) 12:22:29 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:29 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:29 executing program 0: socketpair(0x2c, 0x0, 0x6, &(0x7f0000000000)) 12:22:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:29 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) 12:22:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:29 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r2}}, 0x120) 12:22:29 executing program 0: socketpair(0x2c, 0x0, 0x6, &(0x7f0000000000)) 12:22:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:29 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0}}, 0x20) 12:22:29 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) 12:22:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r2}}, 0x120) 12:22:29 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000000)) 12:22:29 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00042bbd7000fddbdf2501000000060001004e21000008000600640101020500040002000000050004000000000006000a004e20000014000700fc0000000000000000000000000000003c56d987e26761dda2f298e5825ea02870574b302c3bdc665fe091f736bd9c18d48d94f72943ba1d7f57d2bcafa8badfbc953d676fa4f24a269da5d04d6189483e4e20fc4ef6c066e3a425513bb3675ff542c04fcb5c5fc1731d32d1abe101189e5c58a0093f44c91513364a75260626f8a12519d3d6f73e951f906bbc27706a092a34b18060cab12fb871c524e399ab685a34d136a1da530ecf942af5e7114eb7c56c38dec2e08f"], 0x50}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000090) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:29 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000000)) 12:22:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r2}}, 0x120) 12:22:29 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0}}, 0x20) 12:22:29 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:29 executing program 2: syz_genetlink_get_family_id$fou(&(0x7f0000000100), 0xffffffffffffffff) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:29 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000000)) 12:22:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:29 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:30 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:30 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0}}, 0x20) 12:22:30 executing program 0: socketpair(0x2c, 0x3, 0x6, 0x0) 12:22:30 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x2680, 0x0) 12:22:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:30 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:30 executing program 0: socketpair(0x2c, 0x3, 0x6, 0x0) 12:22:30 executing program 2: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x2680, 0x0) 12:22:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:30 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:30 executing program 0: socketpair(0x2c, 0x3, 0x6, 0x0) 12:22:30 executing program 2: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x2680, 0x0) 12:22:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:30 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:30 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000000)) 12:22:30 executing program 2: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x2680, 0x0) 12:22:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:30 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:30 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000000)) 12:22:30 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:30 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:30 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:30 executing program 0: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000000)) 12:22:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:31 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 12:22:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:31 executing program 0: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 12:22:31 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:31 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:31 executing program 0: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 12:22:31 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:31 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:31 executing program 0: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 12:22:31 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:31 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:31 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000000)) 12:22:31 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 2: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:31 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:31 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000000)) 12:22:31 executing program 2: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:31 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000000)) 12:22:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:32 executing program 2: write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:32 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:32 executing program 0: socketpair(0x2c, 0x3, 0x0, 0x0) 12:22:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1}}, 0x20) 12:22:32 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x5d) 12:22:32 executing program 0: socketpair(0x2c, 0x3, 0x0, 0x0) 12:22:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:32 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:32 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:32 executing program 0: socketpair(0x2c, 0x3, 0x0, 0x0) 12:22:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:32 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:32 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}}}, 0x120) 12:22:32 executing program 0: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 12:22:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:32 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:32 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) 12:22:32 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:32 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r5, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400)=0x55, r4, 0x0, 0x0, 0x1}}, 0x20) 12:22:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:33 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) 12:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:33 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:33 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r5, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400)=0x55, r4, 0x0, 0x0, 0x1}}, 0x20) 12:22:33 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:33 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000180)=0x1ff, 0x4) 12:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:33 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:33 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r5, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400)=0x55, r4, 0x0, 0x0, 0x1}}, 0x20) 12:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1}}, 0x20) 12:22:33 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) 12:22:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x5d) 12:22:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, 0xffffffffffffffff, 0x1, 0x1, 0xfffffe12}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) 12:22:33 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:33 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r5, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 12:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x8, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:33 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:33 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) 12:22:33 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0xfffffffd, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x8, 0x61555bc4, 0x6}}) 12:22:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:33 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r5, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) 12:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 12:22:33 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:33 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') fcntl$getown(r1, 0x9) 12:22:33 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000040}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000005b7ab4f558d8b27d2dba4935209149b405e0210426de89225ac12529daa1123fb2a4ba614c1a8dd5476805750b332aa28ab66ea99b63c6d5b858b693ddec6ddd95c84bb42c0e26d0e80890ab453add1c19fc0f7d1e38993bf8c07c57515e124f54d1f4f98a7e7ea8e681133bcc2d6f8057e16dcf956686b1c9f0ea3d10054b6dd92dda39acbb46dd7bfee95c6d50a638a6fe6bd6791f0325ef6d0eaa6dbc80f608940419f6f5096b68a7ddbd1816b330ba82feb7576640557033d22edc92a6d1fbc96cee5a40cec3afb3bfeb41eaa7a8748c10852df28b2950ad8db31c4e03b38de8ab82a4", @ANYRES16=r1, @ANYBLOB="000325bd7000ffdbdf250200000004000500060001004e200000"], 0x20}}, 0x200000c0) accept$netrom(r0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000841}, 0x0) 12:22:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 12:22:34 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) sched_rr_get_interval(r3, &(0x7f00000002c0)) 12:22:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 12:22:34 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:34 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') fcntl$getown(r1, 0x9) 12:22:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:34 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) openat$udambuf(0xffffffffffffff9c, &(0x7f00000005c0), 0x2) 12:22:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 12:22:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x9, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:34 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:34 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') fcntl$getown(r1, 0x9) 12:22:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x8, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 12:22:34 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) 12:22:34 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x9, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:34 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') 12:22:34 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) 12:22:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 12:22:34 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') 12:22:34 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x62, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:34 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:34 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') 12:22:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 12:22:34 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) 12:22:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x3f, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:34 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 12:22:34 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 12:22:34 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0xf1, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:35 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 12:22:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:35 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 12:22:35 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x20, 0x1}, r1}}, 0x120) 12:22:35 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:35 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10}, 0x18) 12:22:35 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 12:22:35 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:35 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) connect$can_j1939(r0, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x1}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180), r2) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x29, 0xff, 0x0, 0x1ff, 0xa, @private0, @mcast1, 0x8000, 0x700, 0x59d3, 0xc5b2}}) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x88, r4, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x29, 0x7f, 0x1d, 0x1000, 0x42, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x700, 0x1, 0x6, 0x7}}) 12:22:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1}, r1}}, 0x120) 12:22:35 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r0, 0x0, 0x2, 0x4}}, 0x20) 12:22:35 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) 12:22:35 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:35 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:35 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10}, 0x78) 12:22:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) 12:22:35 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r0, 0x0, 0x2, 0x4}}, 0x20) 12:22:35 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:35 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:35 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000040)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 12:22:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, r1}}, 0x120) 12:22:35 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r0, 0x0, 0x2, 0x4}}, 0x20) 12:22:35 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:35 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:35 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(0xffffffffffffffff, &(0x7f00000001c0)="8191", 0x2, 0x10, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendto$ax25(r2, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, r1}}, 0x120) 12:22:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:35 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:35 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) 12:22:36 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4"}, r1}}, 0x120) 12:22:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(0xffffffffffffffff, &(0x7f00000001c0)="8191", 0x2, 0x10, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendto$ax25(r2, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:36 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:36 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 12:22:36 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 12:22:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(0xffffffffffffffff, &(0x7f00000001c0)="8191", 0x2, 0x10, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendto$ax25(r2, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:36 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 12:22:36 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000240)) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r2, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 12:22:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:36 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) fork() r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c586104", @ANYRES16=r1, @ANYBLOB="000427bd03000000df250220000008000b0004008000"], 0x1c}}, 0x0) r4 = accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f00000001c0)=0x12, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000180)) 12:22:36 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000540)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "48b7f2f05d17e2b04d5479c5264650607b8f49c2fcc5dd30b615b82d7184434993ba073dfafb3083af0f3afba083a875742531c19f2d33d2a6e25b72603a6ea4a3f267f4ace5fe07435efd8bf96a3d65dd20b60e73661ce43af15e95ec50889678fab72eabb237694479a86a68dac181b71a5905a52bfda4820fada5a44f15e86a15311f384a578ec6f782d6b52076f916f0de36b40d777fc4a1f17fd6a5a61c0db914080776b896f79a25a1974d1276918ea16894ed7f30c84c9a6452de855b4b4818bf6792f7316ef25d51c9ead1b31a856c075c481d1981910a966bf8ed388377409875d54832b4ea25fe2a9108ea6fb3710fcf9d715950743928eb098da4", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 12:22:36 executing program 2: ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:36 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) fork() r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c586104", @ANYRES16=r1, @ANYBLOB="000427bd03000000df250220000008000b0004008000"], 0x1c}}, 0x0) r4 = accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f00000001c0)=0x12, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000180)) 12:22:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:36 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 2: ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) fork() r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c586104", @ANYRES16=r1, @ANYBLOB="000427bd03000000df250220000008000b0004008000"], 0x1c}}, 0x0) r4 = accept4$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @remote}, &(0x7f00000001c0)=0x12, 0x0) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000180)) 12:22:36 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, &(0x7f00000003c0)={0x3, 0x80, 0x4, 0xa, 0xb2}) 12:22:36 executing program 2: ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:37 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) connect$x25(r3, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), 0x4) 12:22:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r1, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r2, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:37 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:37 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) 12:22:37 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) connect$x25(r3, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), 0x4) 12:22:37 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x140a, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20004084) 12:22:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:37 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r0, 0x9) select(0x40, &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x7}, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r1, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:37 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) 12:22:37 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) connect$x25(r3, &(0x7f0000000740), 0x12) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), 0x4) 12:22:37 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x140a, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20004084) 12:22:37 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) fcntl$getown(r0, 0x9) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r1, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:37 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:37 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) 12:22:37 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) connect$x25(r3, &(0x7f0000000740), 0x12) 12:22:37 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x140a, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20004084) 12:22:37 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:37 executing program 2: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000080)={0x10000001}) 12:22:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:37 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x0, 0x80, 0x4, 0xa, 0xb2}) 12:22:37 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r4, &(0x7f0000000740), 0x12) 12:22:37 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:37 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:37 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, 0x0) 12:22:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:37 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x0, 0x80, 0x4, 0xa, 0xb2}) 12:22:37 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xc3) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:37 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, 0x0) 12:22:37 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xc3) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 1', 0x1b) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:38 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x0, 0x80, 0x4, 0xa, 0xb2}) 12:22:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmget$private(0x0, 0x400000, 0x40, &(0x7f0000c00000/0x400000)=nil) shmdt(r3) 12:22:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, 0x0) 12:22:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:38 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0xa, 0xb2}) 12:22:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xc3) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) r3 = shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(r3) 12:22:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)) 12:22:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xc3) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:38 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0xa, 0xb2}) 12:22:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, 0x12) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)) 12:22:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:38 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0xa, 0xb2}) 12:22:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmdt(0x0) 12:22:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:38 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000080)) 12:22:38 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x0, 0xa, 0xb2}) 12:22:38 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x58}) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmdt(0x0) 12:22:38 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:38 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) r2 = shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:38 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r0, &(0x7f0000000740), 0x12) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:38 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0x0, 0xb2}) 12:22:38 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmdt(0x0) 12:22:38 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmdt(0x0) 12:22:39 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:39 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0x0, 0xb2}) 12:22:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) 12:22:39 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:39 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(0xffffffffffffffff, &(0x7f0000000000)="0e566ad307aef47b307a00ace39d8e3bb4d97077785570d2a564bc4f4c89e78c4e8198f8a150d4f5b2a8a84d0f596ea82093b368571278db14eb8a77430cb9013705fc8fbd2ede5207a790ea4934455c905acc326f7201ebd586e672fc17f6ec83cf1a0aed4daaf80436e735653e0f005c9e754ded49b4967cdbbf47e2001234ca986b0a267af776d5c120a245db8798c04abe63e5e8fba3c2ecef7edcf7eb5a0055eadb87850ed793be244c023309671f6315588d6616cd403de3d091bc84f5d7614c7b93e82508028741b1b503ab4c96c0c543c9cd709e89eec3b6f998e17647202484d4d0652e12aa0a79a3aebb23dbc4", 0xf2, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) accept$netrom(r0, 0x0, 0x0) shmget$private(0x0, 0x8000, 0x0, &(0x7f0000ff7000/0x8000)=nil) shmdt(0x0) 12:22:39 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:39 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0x0, 0xb2}) 12:22:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:39 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x1, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:39 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x3000) 12:22:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:39 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0xa}) 12:22:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:39 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:39 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x0) 12:22:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:39 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0xa}) 12:22:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:39 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000003c0)={0x3, 0x0, 0x4, 0xa}) 12:22:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x5000) shmdt(0x0) 12:22:39 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 12:22:40 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) shmdt(0x0) 12:22:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r5}}, 0x18) 12:22:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:40 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x8903, &(0x7f00000001c0)) 12:22:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:40 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) shmdt(0x0) 12:22:40 executing program 2: sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r5}}, 0x18) 12:22:40 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000140)={r6, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106, 0x1}}, 0xffc4) 12:22:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:40 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x0) shmdt(0x0) 12:22:40 executing program 2: sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000200), r5}}, 0x18) 12:22:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:40 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r3, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r3}, 0x78) fcntl$getown(r4, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r6, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000140)={r6, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106, 0x1}}, 0xffc4) 12:22:40 executing program 2: sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) clock_getres(0x0, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x2, 0x1, 0x0, r5}, @call={0x85, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbee35a2, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x91, &(0x7f0000000540)=""/145, 0x40f00, 0x28, '\x00', 0x0, 0x4, r5, 0x8, &(0x7f0000000240)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x4}, 0x10, 0x0, r5}, 0x78) fcntl$getown(r6, 0x9) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r8, &(0x7f0000000740), 0x12) ioctl$UDMABUF_CREATE(r5, 0x40187542, &(0x7f0000000140)={r8, 0x1, 0x1000000000000, 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1}}, 0xffc4) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r9}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r9, 0x0, 0x2, 0x4}}, 0x20) 12:22:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) 12:22:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 12:22:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:40 executing program 4: r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_macvtap\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4800}, 0x40) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r1, 0x0, 0x0) 12:22:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r1, &(0x7f0000000740), 0x12) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0x200, 0x2a, "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", 0x80, 0x1, 0x2, 0x2, 0x20, 0x6, 0xfb}, r4}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) 12:22:40 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:22:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) 12:22:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) 12:22:40 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r0, 0x0, 0x0) 12:22:40 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getitimer(0x1, &(0x7f0000000040)) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x81) 12:22:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) 12:22:41 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r0}}, 0x20) 12:22:41 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080), 0x509bc3, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x20000012) 12:22:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getitimer(0x1, &(0x7f0000000040)) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x81) 12:22:41 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r0}}, 0x20) 12:22:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 12:22:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r2, 0x0, 0x0, 0x1}}, 0x20) 12:22:41 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:41 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f0000000000), 0x12) 12:22:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getitimer(0x1, &(0x7f0000000040)) connect$x25(r0, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x81) 12:22:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x802080, 0x0) 12:22:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r2, 0x0, 0x0, 0x1}}, 0x20) 12:22:41 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r0}}, 0x20) 12:22:41 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x401, 0x2, 0x81, 0x0, r4, 0x3f, '\x00', 0x0, r5, 0x4, 0x2, 0x3}, 0x40) connect$x25(r4, &(0x7f0000000740), 0x12) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x2}}, 0x18) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) 12:22:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getitimer(0x1, &(0x7f0000000040)) connect$x25(r0, &(0x7f0000000740), 0x12) 12:22:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:41 executing program 2: syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 12:22:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r2, 0x0, 0x0, 0x1}}, 0x20) 12:22:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x401, 0x2, 0x81, 0x0, r4, 0x3f, '\x00', 0x0, r5, 0x4, 0x2, 0x3}, 0x40) connect$x25(r4, &(0x7f0000000740), 0x12) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x2}}, 0x18) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) 12:22:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getitimer(0x1, &(0x7f0000000040)) 12:22:41 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:22:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x401, 0x2, 0x81, 0x0, r4, 0x3f, '\x00', 0x0, r5, 0x4, 0x2, 0x3}, 0x40) connect$x25(r4, &(0x7f0000000740), 0x12) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x2}}, 0x18) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) 12:22:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) getitimer(0x1, &(0x7f0000000040)) 12:22:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x3c5, 0x5, "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", 0x6, 0x60, 0x2c, 0x1f, 0x40, 0xfc, 0xf3, 0x1}}}, 0x128) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) fcntl$getown(r6, 0x9) 12:22:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) getitimer(0x1, &(0x7f0000000040)) 12:22:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x401, 0x2, 0x81, 0x0, r4, 0x3f, '\x00', 0x0, r5, 0x4, 0x2, 0x3}, 0x40) connect$x25(r4, &(0x7f0000000740), 0x12) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x2}}, 0x18) 12:22:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x3c5, 0x5, "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", 0x6, 0x60, 0x2c, 0x1f, 0x40, 0xfc, 0xf3, 0x1}}}, 0x128) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) fcntl$getown(r6, 0x9) 12:22:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:42 executing program 5: getitimer(0x1, &(0x7f0000000040)) 12:22:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x401, 0x2, 0x81, 0x0, r4, 0x3f, '\x00', 0x0, r5, 0x4, 0x2, 0x3}, 0x40) connect$x25(r4, &(0x7f0000000740), 0x12) 12:22:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:42 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r0, 0x1, 0x1, 0x120}}, 0x20) 12:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x3c5, 0x5, "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", 0x6, 0x60, 0x2c, 0x1f, 0x40, 0xfc, 0xf3, 0x1}}}, 0x128) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) fcntl$getown(r6, 0x9) 12:22:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r2, 0x0, 0x0, 0x1}}, 0x20) 12:22:42 executing program 5: getitimer(0x0, &(0x7f0000000040)) 12:22:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1b, 0x401, 0x2, 0x81, 0x0, r4, 0x3f, '\x00', 0x0, r5, 0x4, 0x2, 0x3}, 0x40) 12:22:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:42 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r0, 0x1, 0x1, 0x120}}, 0x20) 12:22:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x3c5, 0x5, "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", 0x6, 0x60, 0x2c, 0x1f, 0x40, 0xfc, 0xf3, 0x1}}}, 0x128) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) 12:22:42 executing program 5: getitimer(0x0, &(0x7f0000000040)) 12:22:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:42 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r0, 0x1, 0x1, 0x120}}, 0x20) 12:22:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4040, 0x0) 12:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000540)={0x8, 0x120, 0xfa00, {0x0, {0x3c5, 0x5, "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", 0x6, 0x60, 0x2c, 0x1f, 0x40, 0xfc, 0xf3, 0x1}}}, 0x128) 12:22:42 executing program 5: getitimer(0x0, &(0x7f0000000040)) 12:22:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:42 executing program 5: getitimer(0x1, 0x0) 12:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "90cd954390f9401366f62fa62cb09ce7b3e0b4d6db5768443b70cd610324e1c3be6913c2dfb26657cec886e490a24ab1498c05fbb3e1b435069422dee9cd33a912caaac7dff7d1490a9c4ab22db545e9aa62a1d85fd48600af639c03ca26c17e7ed7349d2760da3c5091632c59553ce10a5290dde40436a8c7f33e713b7e640d938533b82ddd7fd12fc9124c5351273b81fdb342957c53da61009f178a3d5bf12a7d2dfcf0d21a93417e873364574898790a426f16a4ba1c44a5402a659a03692b0a6b00bafaf645c745bbdeae6f31dc3144cae4aaceba0c954c83b3d86b9c40431f006ab2fce0020d0f29b7c60de6adc96c67abc1731ae11fc2a3bb69907218", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r5, &(0x7f0000000740), 0x12) 12:22:42 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r0, 0x0, 0x0, 0x1}}, 0x20) 12:22:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) connect$x25(r3, &(0x7f0000000740), 0x12) 12:22:42 executing program 5: getitimer(0x1, 0x0) 12:22:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:42 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r0, 0x0, 0x0, 0x1}}, 0x20) 12:22:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:42 executing program 5: getitimer(0x1, 0x0) 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x254e02, 0x0) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r0, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "90cd954390f9401366f62fa62cb09ce7b3e0b4d6db5768443b70cd610324e1c3be6913c2dfb26657cec886e490a24ab1498c05fbb3e1b435069422dee9cd33a912caaac7dff7d1490a9c4ab22db545e9aa62a1d85fd48600af639c03ca26c17e7ed7349d2760da3c5091632c59553ce10a5290dde40436a8c7f33e713b7e640d938533b82ddd7fd12fc9124c5351273b81fdb342957c53da61009f178a3d5bf12a7d2dfcf0d21a93417e873364574898790a426f16a4ba1c44a5402a659a03692b0a6b00bafaf645c745bbdeae6f31dc3144cae4aaceba0c954c83b3d86b9c40431f006ab2fce0020d0f29b7c60de6adc96c67abc1731ae11fc2a3bb69907218", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) [ 2176.172167][T28753] INFO: trying to register non-static key. [ 2176.178295][T28753] The code is fine but needs lockdep annotation, or maybe [ 2176.185399][T28753] you didn't initialize this object before use? [ 2176.191638][T28753] turning off the locking correctness validator. [ 2176.197962][T28753] CPU: 0 PID: 28753 Comm: kworker/0:9 Not tainted 5.12.0-syzkaller #0 [ 2176.206422][T28753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2176.216486][T28753] Workqueue: events l2cap_chan_timeout 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) [ 2176.221952][T28753] Call Trace: [ 2176.225228][T28753] dump_stack+0x141/0x1d7 [ 2176.229744][T28753] register_lock_class+0x1077/0x1180 [ 2176.235039][T28753] ? find_held_lock+0x2d/0x110 [ 2176.239809][T28753] ? is_dynamic_key+0x1a0/0x1a0 [ 2176.244662][T28753] ? debug_object_assert_init+0x246/0x2e0 [ 2176.250380][T28753] ? lock_downgrade+0x6e0/0x6e0 [ 2176.255238][T28753] __lock_acquire+0x102/0x5230 [ 2176.260010][T28753] ? mark_lock+0xef/0x17b0 [ 2176.264429][T28753] ? _raw_spin_unlock_irqrestore+0x3d/0x70 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) [ 2176.270247][T28753] ? debug_object_assert_init+0x246/0x2e0 [ 2176.275970][T28753] ? lock_chain_count+0x20/0x20 [ 2176.280829][T28753] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2176.286811][T28753] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2176.292790][T28753] ? stack_trace_save+0x8c/0xc0 [ 2176.297644][T28753] lock_acquire+0x1ab/0x740 [ 2176.302147][T28753] ? skb_dequeue+0x1c/0x180 [ 2176.306648][T28753] ? lock_release+0x720/0x720 [ 2176.311322][T28753] ? mark_held_locks+0x9f/0xe0 [ 2176.316087][T28753] ? cancel_delayed_work+0x2bd/0x340 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) [ 2176.321370][T28753] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 2176.326739][T28753] _raw_spin_lock_irqsave+0x39/0x50 [ 2176.331935][T28753] ? skb_dequeue+0x1c/0x180 [ 2176.336436][T28753] skb_dequeue+0x1c/0x180 [ 2176.340763][T28753] skb_queue_purge+0x21/0x30 [ 2176.345346][T28753] l2cap_chan_del+0x5f3/0xa80 [ 2176.350030][T28753] l2cap_chan_close+0x1bc/0xaf0 [ 2176.354883][T28753] ? l2cap_rx+0x1fb0/0x1fb0 [ 2176.359387][T28753] ? lock_release+0x720/0x720 [ 2176.364063][T28753] ? lock_downgrade+0x6e0/0x6e0 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) [ 2176.368914][T28753] l2cap_chan_timeout+0x17e/0x2f0 [ 2176.373941][T28753] process_one_work+0x98d/0x1600 [ 2176.378882][T28753] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2176.384260][T28753] ? rwlock_bug.part.0+0x90/0x90 [ 2176.389196][T28753] ? _raw_spin_lock_irq+0x41/0x50 [ 2176.394230][T28753] worker_thread+0x64c/0x1120 [ 2176.398919][T28753] ? __kthread_parkme+0x13f/0x1e0 [ 2176.403939][T28753] ? process_one_work+0x1600/0x1600 [ 2176.409134][T28753] kthread+0x3b1/0x4a0 [ 2176.413196][T28753] ? __kthread_bind_mask+0xc0/0xc0 [ 2176.418310][T28753] ret_from_fork+0x1f/0x30 12:22:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x5, @mcast1, 0x5}}}, 0x30) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$x25(r2, &(0x7f0000000740), 0x12) 12:22:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "90cd954390f9401366f62fa62cb09ce7b3e0b4d6db5768443b70cd610324e1c3be6913c2dfb26657cec886e490a24ab1498c05fbb3e1b435069422dee9cd33a912caaac7dff7d1490a9c4ab22db545e9aa62a1d85fd48600af639c03ca26c17e7ed7349d2760da3c5091632c59553ce10a5290dde40436a8c7f33e713b7e640d938533b82ddd7fd12fc9124c5351273b81fdb342957c53da61009f178a3d5bf12a7d2dfcf0d21a93417e873364574898790a426f16a4ba1c44a5402a659a03692b0a6b00bafaf645c745bbdeae6f31dc3144cae4aaceba0c954c83b3d86b9c40431f006ab2fce0020d0f29b7c60de6adc96c67abc1731ae11fc2a3bb69907218", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], 0xffffffffffffffff, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0xce5e5c115ebf5758) 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:43 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 12:22:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:43 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:44 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:44 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:44 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:44 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:44 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:44 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:44 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1}}, 0x20) 12:22:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 12:22:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) 12:22:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}], r1, 0x1, 0x1, 0xd8}}, 0x20) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 12:22:45 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}], r1, 0x1, 0x1, 0x48}}, 0x20) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:45 executing program 0: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}], r1, 0x1, 0x1, 0x48}}, 0x20) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}], r1, 0x1, 0x1, 0x48}}, 0x20) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0xce5e5c115ebf5758) 12:22:45 executing program 0: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:45 executing program 0: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 0: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1}}, 0x20) 12:22:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 12:22:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1}}, 0x20) 12:22:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180), r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180), r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180), 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4, 0x5]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) 12:22:46 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:46 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 12:22:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 12:22:47 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{}], r1, 0x1, 0x1, 0x48}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{}], r1, 0x1, 0x1, 0x48}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x0, 0x0, [0xd5f, 0x401, 0x4]}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{}], r1, 0x1, 0x1, 0x48}}, 0x20) 12:22:47 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) 12:22:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) 12:22:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) 12:22:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "a758f70b364d150bfb159e371541d8cddabf382391044cb1236ebc74e629adc3a7073bc2b4938bdad60ed69d05f41c26fd8ef8a9885b324466a4bd4a56130468d444e3f2571b1ea330871841475615b32986389889de217e6164bf1feba821c34a02df47ed09e83c37907ee963f36dff167b81789f72c425997d6e20a0446fa434eb72cc3aa46c6df8a430df60e545adbfa3067fb75a95173f6c64ebbf64a05300d1d299b3eb955ee522afbc84d693e23dd58015214bebe5252df271671d8f4c5d2a480e8292a65d7214fdb297a46c9179678598705b163a464cdbe7ea452dfc303f8170a17580ff045c99692137e22b4f92450837d09aeb5ebc0f7de9866bfb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "90cd954390f9401366f62fa62cb09ce7b3e0b4d6db5768443b70cd610324e1c3be6913c2dfb26657cec886e490a24ab1498c05fbb3e1b435069422dee9cd33a912caaac7dff7d1490a9c4ab22db545e9aa62a1d85fd48600af639c03ca26c17e7ed7349d2760da3c5091632c59553ce10a5290dde40436a8c7f33e713b7e640d938533b82ddd7fd12fc9124c5351273b81fdb342957c53da61009f178a3d5bf12a7d2dfcf0d21a93417e873364574898790a426f16a4ba1c44a5402a659a03692b0a6b00bafaf645c745bbdeae6f31dc3144cae4aaceba0c954c83b3d86b9c40431f006ab2fce0020d0f29b7c60de6adc96c67abc1731ae11fc2a3bb69907218", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "90cd954390f9401366f62fa62cb09ce7b3e0b4d6db5768443b70cd610324e1c3be6913c2dfb26657cec886e490a24ab1498c05fbb3e1b435069422dee9cd33a912caaac7dff7d1490a9c4ab22db545e9aa62a1d85fd48600af639c03ca26c17e7ed7349d2760da3c5091632c59553ce10a5290dde40436a8c7f33e713b7e640d938533b82ddd7fd12fc9124c5351273b81fdb342957c53da61009f178a3d5bf12a7d2dfcf0d21a93417e873364574898790a426f16a4ba1c44a5402a659a03692b0a6b00bafaf645c745bbdeae6f31dc3144cae4aaceba0c954c83b3d86b9c40431f006ab2fce0020d0f29b7c60de6adc96c67abc1731ae11fc2a3bb69907218", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x40, 0x20, "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", 0x9a, 0x1, 0xef, 0xff, 0x40, 0x1f, 0x1d}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x2}}, 0x20) 12:22:48 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x0, 0x0, [0x9, 0x8000, 0x1]}, {}], r1, 0x1, 0x1, 0x90}}, 0x20) 12:22:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000040)=[{0x5, 0x0, [0x9, 0x8000, 0x1, 0x0, 0x87, 0x1, 0xb049, 0x9, 0xab, 0x3, 0x5, 0x8, 0x0, 0x4, 0x400, 0x3a18]}, {0x1, 0x0, [0xd5f, 0x401, 0x4, 0x5, 0x6, 0x1, 0x2, 0x6, 0xfffffff7, 0x5, 0x81, 0x0, 0x7, 0x20, 0x3, 0x5]}, {0x11, 0x0, [0x8000, 0x3, 0x5, 0x80, 0x9, 0x2, 0x7, 0x84000001, 0x6, 0x10000, 0x3, 0x103, 0x6, 0x2, 0x5, 0x2]}, {0x4, 0x0, [0x5, 0x800, 0x81, 0x574, 0x7, 0xff, 0x9, 0xee7, 0xffffffff, 0x7, 0x101, 0x1ff, 0x1406675a, 0x0, 0x5, 0x101]}], r1, 0x1, 0x1, 0x120}}, 0x20) 12:22:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) 12:22:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x2}}, 0x20) 12:22:48 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r0, 0x0, 0x1, 0x4}}, 0x20) 12:22:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_C