00)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:02:32 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd11", 0x43, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:32 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:32 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:36 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), 0x0) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:37 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:37 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:37 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffff"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:37 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd11", 0x43, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:37 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:02:42 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:42 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:02:42 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), 0x0) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:42 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:42 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffff"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:42 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b", 0x44, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:47 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(0x0, 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:47 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:02:47 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:48 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:48 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b", 0x44, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:48 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:49 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b", 0x44, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:49 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(0x0, 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:49 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:02:49 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:51 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:51 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:52 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:53 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, 0x0, &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:53 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:54 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:54 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(0x0, 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:02:54 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:02:54 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:01 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:03:01 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:02 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:02 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:02 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f00"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:02 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, 0x0, &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:04 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:07 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:08 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:08 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f00"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:08 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:08 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:03:09 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:09 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:03:13 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f00"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:14 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f000000852000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:03:16 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:04:52 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, 0x0, &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:52 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f000000852000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:52 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x0, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:04:52 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:52 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:52 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) [ 3174.154730][ T7381] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3174.346222][ T7381] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:04:53 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x0, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:04:53 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:53 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:53 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) [ 3174.504766][ T7381] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:04:53 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f000000852000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) [ 3174.588785][ T7381] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 14:04:54 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x0, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) [ 3175.417063][T27748] chnl_net:caif_netlink_parms(): no params data found [ 3175.455790][T27748] bridge0: port 1(bridge_slave_0) entered blocking state [ 3175.462876][T27748] bridge0: port 1(bridge_slave_0) entered disabled state [ 3175.470349][T27748] bridge_slave_0: entered allmulticast mode [ 3175.476800][T27748] bridge_slave_0: entered promiscuous mode [ 3175.488120][T27748] bridge0: port 2(bridge_slave_1) entered blocking state [ 3175.495195][T27748] bridge0: port 2(bridge_slave_1) entered disabled state [ 3175.502456][T27748] bridge_slave_1: entered allmulticast mode [ 3175.508798][T27748] bridge_slave_1: entered promiscuous mode [ 3175.525836][T27748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3175.539977][T27748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3175.562266][T27748] team0: Port device team_slave_0 added [ 3175.568991][T27748] team0: Port device team_slave_1 added [ 3175.591724][T27748] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3175.598758][T27748] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3175.624951][T27748] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3175.639626][T27748] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3175.646601][T27748] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3175.672808][T27748] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3175.701584][T27748] hsr_slave_0: entered promiscuous mode [ 3175.707889][T27748] hsr_slave_1: entered promiscuous mode [ 3175.713703][T27748] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3175.721625][T27748] Cannot create hsr debugfs directory [ 3175.747496][ T7381] hsr_slave_0: left promiscuous mode [ 3175.753192][ T7381] hsr_slave_1: left promiscuous mode [ 3175.760039][ T7381] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3175.767581][ T7381] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3175.775317][ T7381] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3175.783013][ T7381] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3175.792445][ T7381] bridge_slave_1: left allmulticast mode [ 3175.798341][ T7381] bridge_slave_1: left promiscuous mode [ 3175.803987][ T7381] bridge0: port 2(bridge_slave_1) entered disabled state [ 3175.813191][ T7381] bridge_slave_0: left allmulticast mode [ 3175.818877][ T7381] bridge_slave_0: left promiscuous mode [ 3175.824506][ T7381] bridge0: port 1(bridge_slave_0) entered disabled state [ 3175.835543][ T7381] veth1_macvtap: left promiscuous mode [ 3175.841088][ T7381] veth0_macvtap: left promiscuous mode [ 3175.846638][ T7381] veth1_vlan: left promiscuous mode [ 3175.851913][ T7381] veth0_vlan: left promiscuous mode [ 3175.931831][ T7381] team0 (unregistering): Port device team_slave_1 removed [ 3175.941751][ T7381] team0 (unregistering): Port device team_slave_0 removed [ 3175.951552][ T7381] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3175.962690][ T7381] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3175.992463][ T7381] bond0 (unregistering): Released all slaves [ 3176.503743][T27748] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 3176.528680][T27748] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 3176.558047][T27748] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 3176.577578][T27748] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 3176.687988][T27748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3176.730482][T27748] 8021q: adding VLAN 0 to HW filter on device team0 [ 3176.758335][T11384] bridge0: port 1(bridge_slave_0) entered blocking state [ 3176.765424][T11384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3176.784477][T27748] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3176.794895][T27748] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3176.807393][T13526] bridge0: port 2(bridge_slave_1) entered blocking state [ 3176.814486][T13526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3176.859585][T27748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3176.952544][T27748] veth0_vlan: entered promiscuous mode [ 3176.963250][T27748] veth1_vlan: entered promiscuous mode [ 3176.975570][T27748] veth0_macvtap: entered promiscuous mode [ 3176.985461][T27748] veth1_macvtap: entered promiscuous mode [ 3176.995597][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3177.006221][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.016122][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3177.026627][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.036676][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3177.047188][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.057032][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3177.067526][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.077364][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3177.087851][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.098755][T27748] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3177.109053][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3177.119507][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.129391][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3177.139886][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.149786][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3177.160289][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.170095][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3177.180635][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.190517][T27748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3177.201039][T27748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3177.211945][T27748] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3177.221822][T27748] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3177.230630][T27748] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3177.239431][T27748] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3177.248214][T27748] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 14:04:58 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f000000852000000300"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), 0x0, &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f000000852000000300"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), 0x0, &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:58 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:04:59 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), 0x0, &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:59 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:59 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:59 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:04:59 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:04:59 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), 0x0) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:00 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f000000852000000300"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:00 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:00 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:00 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:00 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:00 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), 0x0) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:01 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:01 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:01 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), 0x0) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:01 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:01 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:04 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:45 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f00000085200000030000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:45 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:45 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f00000085200000030000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)) getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:46 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f00000085200000030000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:50 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:50 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:50 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:50 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:50 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:50 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc10") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc10") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:05:51 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc10") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7b") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:01 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:12 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:12 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:12 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:13 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:13 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:13 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:13 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:13 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7b") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:22 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:22 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7b") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:22 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:22 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adf") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:23 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:24 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adf") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:24 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:24 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:24 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:24 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:28 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:28 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:28 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adf") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:28 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:28 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:28 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:33 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:33 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:33 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:34 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:34 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:36 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:36 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:36 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:36 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:36 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:36 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:37 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:47 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:48 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1e", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:49 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:49 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:49 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:49 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:49 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:52 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, 0x0, 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:53 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, 0x0, 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:54 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r2}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:06:55 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1e", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:55 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:55 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:55 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:56 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:06:56 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:00 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1e", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:01 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:02 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b8", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:03 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:03 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:03 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:03 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, 0x0, 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:04 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:05 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:07 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x0, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:08 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:08 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:08 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:09 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:09 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:09 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b8", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:09 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:10 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x0, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:11 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:11 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b8", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:11 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:12 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:13 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x0, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:13 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:16 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:18 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:18 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:19 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:19 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:19 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:19 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:21 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:21 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:23 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:23 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:23 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:23 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:23 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:23 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:26 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:26 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:28 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:28 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:29 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:29 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:07:29 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:30 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:30 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:31 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:31 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:34 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], 0x0, 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:34 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:07:34 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:35 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:35 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:37 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], 0x0, 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:37 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:37 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:07:37 executing program 0: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:37 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:38 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:38 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:39 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:39 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:47 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:47 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:47 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:47 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], 0x0, 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:47 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:47 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:52 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:53 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:53 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, 0x0, 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:53 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:53 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:53 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:07:54 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:07:54 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:00 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:00 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:00 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:00 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:00 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:00 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:04 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:04 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:04 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:05 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:05 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:05 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:05 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:09 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:10 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:11 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:12 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, 0x0, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:12 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(0x0, 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:13 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc10") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:13 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x0, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:13 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:13 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000), 0x0, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:15 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:16 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:17 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x0, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:17 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:18 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc10") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:18 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:18 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:18 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, 0x0, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:21 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:21 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c", 0x39, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:22 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x0, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:24 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, 0x0, 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:24 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc10") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:24 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:24 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:24 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:25 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:27 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7b") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:28 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:29 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400), 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:31 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7b") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:32 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:32 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7b") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:32 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce", 0x56, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:32 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:33 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:33 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:33 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400), 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:34 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400), 0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:35 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7", 0x2a, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:39 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:39 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:40 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:40 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) 14:08:40 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adf") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:40 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7", 0x2a, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:43 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adf") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:44 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adf") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:44 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:47 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:49 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:49 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:49 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:50 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:50 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7", 0x2a, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:50 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) 14:08:52 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:53 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:53 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfff", 0x64, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:08:53 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) 14:08:53 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c", 0x3f, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:08:53 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:00 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:01 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:01 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:09:02 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:03 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:03 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c", 0x3f, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:05 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c", 0x3f, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:06 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:09 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:09 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5", 0x6b, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:09 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:09:09 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4", 0x49, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:09 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, 0x0, 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:09 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:14 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:17 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4", 0x49, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:18 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, 0x0, 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:18 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:18 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:18 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:09:18 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:22 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:22 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") getuid() syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:09:24 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:24 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:24 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d", 0x6f, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:25 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:25 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4", 0x49, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:27 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), 0x0) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:27 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, 0x0, 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:27 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:09:28 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c", 0x4e, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:28 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:28 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:30 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c", 0x4e, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:09:30 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x0, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:30 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:33 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9b", 0x71, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:33 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:09:33 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:02 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:02 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:02 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x0, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:02 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:02 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c", 0x4e, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:02 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:03 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:03 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570c", 0x51, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:03 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:03 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:03 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:04 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) [ 3545.280554][T29977] chnl_net:caif_netlink_parms(): no params data found [ 3545.331389][T29977] bridge0: port 1(bridge_slave_0) entered blocking state [ 3545.338517][T29977] bridge0: port 1(bridge_slave_0) entered disabled state [ 3545.347250][T29977] bridge_slave_0: entered allmulticast mode [ 3545.353805][T29977] bridge_slave_0: entered promiscuous mode [ 3545.361230][T29977] bridge0: port 2(bridge_slave_1) entered blocking state [ 3545.368523][T29977] bridge0: port 2(bridge_slave_1) entered disabled state [ 3545.375828][T29977] bridge_slave_1: entered allmulticast mode [ 3545.382352][T29977] bridge_slave_1: entered promiscuous mode [ 3545.400796][T29977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3545.412033][T29977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3545.430539][T29977] team0: Port device team_slave_0 added [ 3545.437203][T29977] team0: Port device team_slave_1 added [ 3545.451797][T29977] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3545.458794][T29977] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3545.485501][T29977] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3545.496829][T29977] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3545.503802][T29977] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3545.529736][T29977] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3545.558011][T29977] hsr_slave_0: entered promiscuous mode [ 3545.563908][T29977] hsr_slave_1: entered promiscuous mode [ 3545.569757][T29977] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3545.577315][T29977] Cannot create hsr debugfs directory [ 3545.607775][T29977] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3545.738955][T29977] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3545.810231][T29977] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3545.860324][T29977] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3545.954831][T29977] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 3545.963625][T29977] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 3545.972865][T29977] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 3545.983975][T29977] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 3546.034286][T29977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3546.050830][T29977] 8021q: adding VLAN 0 to HW filter on device team0 [ 3546.061647][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 3546.068720][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3546.079838][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 3546.087000][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3546.107480][T29977] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3546.117934][T29977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3546.167894][T29977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3546.270403][T29977] veth0_vlan: entered promiscuous mode [ 3546.278463][T29977] veth1_vlan: entered promiscuous mode [ 3546.291921][T29977] veth0_macvtap: entered promiscuous mode [ 3546.301662][T29977] veth1_macvtap: entered promiscuous mode [ 3546.319648][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3546.330236][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.340117][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3546.351240][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.361107][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3546.371592][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.381566][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3546.391993][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.401950][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3546.412537][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.422453][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3546.432898][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.444235][T29977] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3546.465225][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3546.475824][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.485669][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3546.496328][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.506213][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3546.516705][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.526532][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3546.536979][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.546898][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3546.557379][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.567272][T29977] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3546.577754][T29977] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3546.588639][T29977] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3546.598690][T29977] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3546.607608][T29977] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3546.616461][T29977] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3546.625147][T29977] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3546.977734][ T4200] hsr_slave_0: left promiscuous mode [ 3546.983353][ T4200] hsr_slave_1: left promiscuous mode [ 3546.989206][ T4200] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3546.996690][ T4200] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3547.004204][ T4200] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3547.011729][ T4200] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3547.019379][ T4200] bridge_slave_1: left allmulticast mode [ 3547.024999][ T4200] bridge_slave_1: left promiscuous mode [ 3547.030691][ T4200] bridge0: port 2(bridge_slave_1) entered disabled state [ 3547.038143][ T4200] bridge_slave_0: left allmulticast mode [ 3547.043761][ T4200] bridge_slave_0: left promiscuous mode [ 3547.049410][ T4200] bridge0: port 1(bridge_slave_0) entered disabled state [ 3547.059129][ T4200] veth1_macvtap: left promiscuous mode [ 3547.064584][ T4200] veth0_macvtap: left promiscuous mode [ 3547.070207][ T4200] veth1_vlan: left promiscuous mode [ 3547.075414][ T4200] veth0_vlan: left promiscuous mode [ 3547.162868][ T4200] team0 (unregistering): Port device team_slave_1 removed [ 3547.172524][ T4200] team0 (unregistering): Port device team_slave_0 removed [ 3547.182388][ T4200] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3547.193648][ T4200] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3547.222989][ T4200] bond0 (unregistering): Released all slaves 14:11:07 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:07 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:07 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x0, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:07 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, 0x0, &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:07 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:07 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570c", 0x51, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:08 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:08 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570c", 0x51, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:08 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:08 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)) statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:08 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:09 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:09 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6", 0x52, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:09 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:09 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:09 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:09 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x0, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 1: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x0) syz_clone(0x0, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570c", 0x51, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:12 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) [ 3554.491163][ T23] ================================================================== [ 3554.499257][ T23] BUG: KCSAN: data-race in blk_mq_dispatch_rq_list / blk_mq_dispatch_rq_list [ 3554.507998][ T23] [ 3554.510299][ T23] read to 0xffff8881001876f8 of 4 bytes by task 29958 on cpu 0: [ 3554.517903][ T23] blk_mq_dispatch_rq_list+0xf30/0x1090 [ 3554.523437][ T23] __blk_mq_sched_dispatch_requests+0x1ce/0xd20 [ 3554.529666][ T23] blk_mq_sched_dispatch_requests+0x99/0x100 [ 3554.535624][ T23] blk_mq_run_hw_queue+0x2a4/0x4c0 [ 3554.540710][ T23] blk_mq_flush_plug_list+0x7b6/0xdc0 [ 3554.546057][ T23] blk_add_rq_to_plug+0x108/0x3e0 [ 3554.551068][ T23] blk_mq_submit_bio+0x61a/0xd90 [ 3554.555992][ T23] __submit_bio+0x11c/0x350 [ 3554.560540][ T23] submit_bio_noacct_nocheck+0x4ad/0x5e0 [ 3554.566149][ T23] submit_bio_noacct+0x70c/0x8c0 [ 3554.571093][ T23] submit_bio+0xb7/0xc0 [ 3554.575225][ T23] ext4_bio_write_folio+0x6c0/0x9a0 [ 3554.580405][ T23] ext4_do_writepages+0x139f/0x2100 [ 3554.585579][ T23] ext4_writepages+0x15e/0x2e0 [ 3554.590326][ T23] do_writepages+0x1c2/0x340 [ 3554.594903][ T23] filemap_fdatawrite_wbc+0xdb/0xf0 [ 3554.600164][ T23] filemap_flush+0x95/0xc0 [ 3554.604557][ T23] ext4_alloc_da_blocks+0x50/0x130 [ 3554.609645][ T23] ext4_release_file+0x5f/0x1c0 [ 3554.614499][ T23] __fput+0x299/0x630 [ 3554.618462][ T23] ____fput+0x15/0x20 [ 3554.622422][ T23] task_work_run+0x135/0x1a0 [ 3554.626993][ T23] do_exit+0x604/0x16d0 [ 3554.631127][ T23] do_group_exit+0x101/0x150 [ 3554.635693][ T23] get_signal+0xf4e/0x10a0 [ 3554.640089][ T23] arch_do_signal_or_restart+0x95/0x4b0 [ 3554.645613][ T23] exit_to_user_mode_loop+0x6f/0xe0 [ 3554.650889][ T23] exit_to_user_mode_prepare+0x6c/0xb0 [ 3554.656334][ T23] irqentry_exit_to_user_mode+0x9/0x20 [ 3554.661784][ T23] irqentry_exit+0x12/0x40 [ 3554.666181][ T23] asm_exc_page_fault+0x26/0x30 [ 3554.671022][ T23] [ 3554.673324][ T23] write to 0xffff8881001876f8 of 4 bytes by task 23 on cpu 1: [ 3554.680766][ T23] blk_mq_dispatch_rq_list+0xf4d/0x1090 [ 3554.686325][ T23] __blk_mq_sched_dispatch_requests+0x5ec/0xd20 [ 3554.692553][ T23] blk_mq_sched_dispatch_requests+0x99/0x100 [ 3554.698526][ T23] blk_mq_run_work_fn+0x65/0xe0 [ 3554.703355][ T23] process_scheduled_works+0x5b8/0xa30 [ 3554.708800][ T23] worker_thread+0x525/0x730 [ 3554.713371][ T23] kthread+0x1d7/0x210 [ 3554.717429][ T23] ret_from_fork+0x48/0x60 [ 3554.722007][ T23] ret_from_fork_asm+0x11/0x20 [ 3554.726757][ T23] [ 3554.729060][ T23] value changed: 0x00000008 -> 0x00000009 [ 3554.734756][ T23] [ 3554.737066][ T23] Reported by Kernel Concurrency Sanitizer on: [ 3554.743215][ T23] CPU: 1 PID: 23 Comm: kworker/1:0H Not tainted 6.7.0-rc7-syzkaller-00049-g453f5db0619e #0 [ 3554.753171][ T23] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 3554.763215][ T23] Workqueue: kblockd blk_mq_run_work_fn [ 3554.768745][ T23] ================================================================== 14:11:18 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:18 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:18 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:18 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570c", 0x51, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10) 14:11:18 executing program 0: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5a") pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") socket$nl_generic(0x10, 0x3, 0x10) 14:11:18 executing program 5: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75e", 0x4b, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), 0x0, &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:19 executing program 2: r0 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f56", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000001f0000008520000003000000"], &(0x7f0000000100)='syzkaller\x00', 0x8001, 0xeb, &(0x7f0000000140)=""/235, 0x41000, 0x28, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000300)=[{0x0, 0x5, 0x9, 0x2}, {0x4, 0x1, 0x5, 0x9}]}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570cd6d6", 0x53, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e7acc0a4ef161143bcb559760a5114edb0eb7a2b35c327ac5be7e4f569964537322e7b9ffd3bc50bc101f4d7db73cff7bc93adff6c5fc") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:19 executing program 4: getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000680), 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1a, 0x0, 0x1) geteuid() bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30", 0x26, &(0x7f0000000480), &(0x7f00000004c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d", 0x45, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06") getuid() pipe2$9p(&(0x7f0000000080), 0x4000) syz_clone(0x80104000, &(0x7f0000007000)="554472b60bd67df8a1d4ee9c4ba58b44095923f298c82da24f866c7599d9d3fbcf623fb2688a6a981a18d251c2923a7efd4aea1af2f4e5039c1ea13bf3ba15719e1b17beca2537b118789894694b10c69f80103eecce11852ee02972fec0398948c8cfffeea7c9bf647ea5feca4b9d7f9bd0", 0x72, &(0x7f0000007080), &(0x7f00000070c0), &(0x7f0000007100)="77207cd299e432b2c6f523f24530ac2051d01c2ec8f1413c063e5328f7946133a50118cf32f55b2116ba510d31c04ecd5e9d30950f340289a27d0bb2d211b1e069c79111cb1cf41a144aab7c4bf6d22bcd72a5b8a0dcd3bf5e4bcae1ce312bab48b5a6dd827fba311183b0d2aa90865bd3a0e050ec6fa7ed086512b71da74ed1c26e6493e624085c118868206f7122558309fef86744ac71b96419765d9b8a1aaca51c4e") statx(0xffffffffffffff9c, &(0x7f0000007340)='./file0\x00', 0x800, 0x8, &(0x7f0000007380)) socket$nl_generic(0x10, 0x3, 0x10) 14:11:19 executing program 3: r0 = socket(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0x1a, 0x0, 0x1) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0xc, &(0x7f0000007740)=ANY=[@ANYBLOB="958000000000000018ff000000fd57e7881f23f3ddc08c1ecda9f0b84c7f", @ANYRES32], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf4b}, 0x90) syz_clone(0x80000600, &(0x7f0000000400)="e00188badb8471b37c398ee16867b82db290fdec86bc1d4e4f4900bb956739fbd1994e519d30766648e7349b8546b6c2d9fa3886081862062a952d9caa7e8c84eea1fc55945c459cb4b75efa266c9a570c", 0x51, 0x0, &(0x7f00000004c0), &(0x7f0000000500)="8e85f59f7a9e2ed3daa15ec2c5776cc54142bc1b29e40c6658cf72edab02c4e48e8915ddb4d4a2408c200f0f26defdd693e205614e66aac51bf5a6038c55c0ad47483010ab1bce7d5ff546d545504fab4b14ff7427f4c8e8248e7570be8ab23473625abe8728090c1ff8e34b8f9d846dcc0dcd4f8d83298de29c733a89d3a78e84aaf94175df52c328857ce51f1f8a525cf690a1992111123e6d43a5974f7da70f6429aa99e3b45b26eb17949a29b99402ac067bc1d2c1e87e7fad12fc6f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) syz_clone(0x62242280, &(0x7f0000006ec0)="450d0d79e2ac45f64a28d353f457bde32cd9f53623e1b97561cdf59b9376a4f7cf07522622aec1f8bb72dd23499994edb429614b629d9fe51c578b5713a6442344fd118b9d504f75ddb8d6737e6885eac1177d45feb3e5fd988d453c86dbba3e3fdae8", 0x63, &(0x7f0000000640), &(0x7f0000006f40), &(0x7f0000006f80)="32a77438e9cc270f67608c783154e3eebf34ea8547af0fa2df7780065ad209ae5aad06f7") getuid() socket$l2tp(0x2, 0x2, 0x73) pipe2$9p(&(0x7f0000000080), 0x4000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000006fc0)={0x1}, 0x4) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001a80)={{0x1}, &(0x7f00000000c0), &(0x7f0000001a40)=r3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x111}}, 0x20) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_generic(0x10, 0x3, 0x10)